OPENSUSE-SU-2026:20151-1
Vulnerability from csaf_opensuse - Published: 2026-02-02 12:56 - Updated: 2026-02-02 12:56Summary
Security update for wireshark
Notes
Title of the patch
Security update for wireshark
Description of the patch
This update for wireshark fixes the following issues:
Update to Wireshark 4.4.13:
- CVE-2025-11626: MONGO dissector infinite loop (bsc#1251933).
- CVE-2025-13499: Kafka dissector crash (bsc#1254108).
- CVE-2025-13945: HTTP3 dissector crash (bsc#1254471).
- CVE-2025-13946: MEGACO dissector infinite loop (bsc#1254472).
- CVE-2025-9817: SSH dissector crash (bsc#1249090).
- CVE-2026-0959: IEEE 802.11 dissector crash (bsc#1256734).
- CVE-2026-0961: BLF file parser crash (bsc#1256738).
- CVE-2026-0962: SOME/IP-SD dissector crash (bsc#1256739).
Full changelog:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.13.html
Patchnames
openSUSE-Leap-16.0-236
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for wireshark",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for wireshark fixes the following issues:\n\nUpdate to Wireshark 4.4.13:\n\n- CVE-2025-11626: MONGO dissector infinite loop (bsc#1251933).\n- CVE-2025-13499: Kafka dissector crash (bsc#1254108).\n- CVE-2025-13945: HTTP3 dissector crash (bsc#1254471).\n- CVE-2025-13946: MEGACO dissector infinite loop (bsc#1254472).\n- CVE-2025-9817: SSH dissector crash (bsc#1249090).\n- CVE-2026-0959: IEEE 802.11 dissector crash (bsc#1256734).\n- CVE-2026-0961: BLF file parser crash (bsc#1256738).\n- CVE-2026-0962: SOME/IP-SD dissector crash (bsc#1256739).\n\nFull changelog:\n\nhttps://www.wireshark.org/docs/relnotes/wireshark-4.4.13.html\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-236",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20151-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1249090",
"url": "https://bugzilla.suse.com/1249090"
},
{
"category": "self",
"summary": "SUSE Bug 1251933",
"url": "https://bugzilla.suse.com/1251933"
},
{
"category": "self",
"summary": "SUSE Bug 1254108",
"url": "https://bugzilla.suse.com/1254108"
},
{
"category": "self",
"summary": "SUSE Bug 1254471",
"url": "https://bugzilla.suse.com/1254471"
},
{
"category": "self",
"summary": "SUSE Bug 1254472",
"url": "https://bugzilla.suse.com/1254472"
},
{
"category": "self",
"summary": "SUSE Bug 1256734",
"url": "https://bugzilla.suse.com/1256734"
},
{
"category": "self",
"summary": "SUSE Bug 1256738",
"url": "https://bugzilla.suse.com/1256738"
},
{
"category": "self",
"summary": "SUSE Bug 1256739",
"url": "https://bugzilla.suse.com/1256739"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-11626 page",
"url": "https://www.suse.com/security/cve/CVE-2025-11626/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13499 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13945 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13946 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-9817 page",
"url": "https://www.suse.com/security/cve/CVE-2025-9817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0959 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0959/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0961 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0962 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0962/"
}
],
"title": "Security update for wireshark",
"tracking": {
"current_release_date": "2026-02-02T12:56:02Z",
"generator": {
"date": "2026-02-02T12:56:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20151-1",
"initial_release_date": "2026-02-02T12:56:02Z",
"revision_history": [
{
"date": "2026-02-02T12:56:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libwireshark18-4.4.13-160000.1.1.aarch64",
"product": {
"name": "libwireshark18-4.4.13-160000.1.1.aarch64",
"product_id": "libwireshark18-4.4.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libwiretap15-4.4.13-160000.1.1.aarch64",
"product": {
"name": "libwiretap15-4.4.13-160000.1.1.aarch64",
"product_id": "libwiretap15-4.4.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libwsutil16-4.4.13-160000.1.1.aarch64",
"product": {
"name": "libwsutil16-4.4.13-160000.1.1.aarch64",
"product_id": "libwsutil16-4.4.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "wireshark-4.4.13-160000.1.1.aarch64",
"product": {
"name": "wireshark-4.4.13-160000.1.1.aarch64",
"product_id": "wireshark-4.4.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "wireshark-devel-4.4.13-160000.1.1.aarch64",
"product": {
"name": "wireshark-devel-4.4.13-160000.1.1.aarch64",
"product_id": "wireshark-devel-4.4.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"product": {
"name": "wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"product_id": "wireshark-ui-qt-4.4.13-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libwireshark18-4.4.13-160000.1.1.ppc64le",
"product": {
"name": "libwireshark18-4.4.13-160000.1.1.ppc64le",
"product_id": "libwireshark18-4.4.13-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libwiretap15-4.4.13-160000.1.1.ppc64le",
"product": {
"name": "libwiretap15-4.4.13-160000.1.1.ppc64le",
"product_id": "libwiretap15-4.4.13-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libwsutil16-4.4.13-160000.1.1.ppc64le",
"product": {
"name": "libwsutil16-4.4.13-160000.1.1.ppc64le",
"product_id": "libwsutil16-4.4.13-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wireshark-4.4.13-160000.1.1.ppc64le",
"product": {
"name": "wireshark-4.4.13-160000.1.1.ppc64le",
"product_id": "wireshark-4.4.13-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wireshark-devel-4.4.13-160000.1.1.ppc64le",
"product": {
"name": "wireshark-devel-4.4.13-160000.1.1.ppc64le",
"product_id": "wireshark-devel-4.4.13-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"product": {
"name": "wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"product_id": "wireshark-ui-qt-4.4.13-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libwireshark18-4.4.13-160000.1.1.s390x",
"product": {
"name": "libwireshark18-4.4.13-160000.1.1.s390x",
"product_id": "libwireshark18-4.4.13-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libwiretap15-4.4.13-160000.1.1.s390x",
"product": {
"name": "libwiretap15-4.4.13-160000.1.1.s390x",
"product_id": "libwiretap15-4.4.13-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libwsutil16-4.4.13-160000.1.1.s390x",
"product": {
"name": "libwsutil16-4.4.13-160000.1.1.s390x",
"product_id": "libwsutil16-4.4.13-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "wireshark-4.4.13-160000.1.1.s390x",
"product": {
"name": "wireshark-4.4.13-160000.1.1.s390x",
"product_id": "wireshark-4.4.13-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "wireshark-devel-4.4.13-160000.1.1.s390x",
"product": {
"name": "wireshark-devel-4.4.13-160000.1.1.s390x",
"product_id": "wireshark-devel-4.4.13-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"product": {
"name": "wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"product_id": "wireshark-ui-qt-4.4.13-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libwireshark18-4.4.13-160000.1.1.x86_64",
"product": {
"name": "libwireshark18-4.4.13-160000.1.1.x86_64",
"product_id": "libwireshark18-4.4.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libwiretap15-4.4.13-160000.1.1.x86_64",
"product": {
"name": "libwiretap15-4.4.13-160000.1.1.x86_64",
"product_id": "libwiretap15-4.4.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libwsutil16-4.4.13-160000.1.1.x86_64",
"product": {
"name": "libwsutil16-4.4.13-160000.1.1.x86_64",
"product_id": "libwsutil16-4.4.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-4.4.13-160000.1.1.x86_64",
"product": {
"name": "wireshark-4.4.13-160000.1.1.x86_64",
"product_id": "wireshark-4.4.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-devel-4.4.13-160000.1.1.x86_64",
"product": {
"name": "wireshark-devel-4.4.13-160000.1.1.x86_64",
"product_id": "wireshark-devel-4.4.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-ui-qt-4.4.13-160000.1.1.x86_64",
"product": {
"name": "wireshark-ui-qt-4.4.13-160000.1.1.x86_64",
"product_id": "wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libwireshark18-4.4.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64"
},
"product_reference": "libwireshark18-4.4.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwireshark18-4.4.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le"
},
"product_reference": "libwireshark18-4.4.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwireshark18-4.4.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x"
},
"product_reference": "libwireshark18-4.4.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwireshark18-4.4.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64"
},
"product_reference": "libwireshark18-4.4.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwiretap15-4.4.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64"
},
"product_reference": "libwiretap15-4.4.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwiretap15-4.4.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le"
},
"product_reference": "libwiretap15-4.4.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwiretap15-4.4.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x"
},
"product_reference": "libwiretap15-4.4.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwiretap15-4.4.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64"
},
"product_reference": "libwiretap15-4.4.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwsutil16-4.4.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64"
},
"product_reference": "libwsutil16-4.4.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwsutil16-4.4.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le"
},
"product_reference": "libwsutil16-4.4.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwsutil16-4.4.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x"
},
"product_reference": "libwsutil16-4.4.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwsutil16-4.4.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64"
},
"product_reference": "libwsutil16-4.4.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-4.4.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64"
},
"product_reference": "wireshark-4.4.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-4.4.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le"
},
"product_reference": "wireshark-4.4.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-4.4.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x"
},
"product_reference": "wireshark-4.4.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-4.4.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64"
},
"product_reference": "wireshark-4.4.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-4.4.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64"
},
"product_reference": "wireshark-devel-4.4.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-4.4.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le"
},
"product_reference": "wireshark-devel-4.4.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-4.4.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x"
},
"product_reference": "wireshark-devel-4.4.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-4.4.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64"
},
"product_reference": "wireshark-devel-4.4.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-ui-qt-4.4.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64"
},
"product_reference": "wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-ui-qt-4.4.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le"
},
"product_reference": "wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-ui-qt-4.4.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x"
},
"product_reference": "wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-ui-qt-4.4.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
},
"product_reference": "wireshark-ui-qt-4.4.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-11626",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-11626"
}
],
"notes": [
{
"category": "general",
"text": "MONGO dissector infinite loop in Wireshark 4.4.0 to 4.4.9 and 4.2.0 to 4.2.13 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-11626",
"url": "https://www.suse.com/security/cve/CVE-2025-11626"
},
{
"category": "external",
"summary": "SUSE Bug 1251933 for CVE-2025-11626",
"url": "https://bugzilla.suse.com/1251933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-02T12:56:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-11626"
},
{
"cve": "CVE-2025-13499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13499"
}
],
"notes": [
{
"category": "general",
"text": "Kafka dissector crash in Wireshark 4.6.0 and 4.4.0 to 4.4.10 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13499",
"url": "https://www.suse.com/security/cve/CVE-2025-13499"
},
{
"category": "external",
"summary": "SUSE Bug 1254108 for CVE-2025-13499",
"url": "https://bugzilla.suse.com/1254108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-02T12:56:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-13499"
},
{
"cve": "CVE-2025-13945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13945"
}
],
"notes": [
{
"category": "general",
"text": "HTTP3 dissector crash in Wireshark 4.6.0 and 4.6.1 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13945",
"url": "https://www.suse.com/security/cve/CVE-2025-13945"
},
{
"category": "external",
"summary": "SUSE Bug 1254471 for CVE-2025-13945",
"url": "https://bugzilla.suse.com/1254471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-02T12:56:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-13945"
},
{
"cve": "CVE-2025-13946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13946"
}
],
"notes": [
{
"category": "general",
"text": "MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13946",
"url": "https://www.suse.com/security/cve/CVE-2025-13946"
},
{
"category": "external",
"summary": "SUSE Bug 1254472 for CVE-2025-13946",
"url": "https://bugzilla.suse.com/1254472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-02T12:56:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-13946"
},
{
"cve": "CVE-2025-9817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-9817"
}
],
"notes": [
{
"category": "general",
"text": "SSH dissector crash in Wireshark 4.4.0 to 4.4.8 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-9817",
"url": "https://www.suse.com/security/cve/CVE-2025-9817"
},
{
"category": "external",
"summary": "SUSE Bug 1249090 for CVE-2025-9817",
"url": "https://bugzilla.suse.com/1249090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-02T12:56:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-9817"
},
{
"cve": "CVE-2026-0959",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0959"
}
],
"notes": [
{
"category": "general",
"text": "IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0959",
"url": "https://www.suse.com/security/cve/CVE-2026-0959"
},
{
"category": "external",
"summary": "SUSE Bug 1256734 for CVE-2026-0959",
"url": "https://bugzilla.suse.com/1256734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-02T12:56:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-0959"
},
{
"cve": "CVE-2026-0961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0961"
}
],
"notes": [
{
"category": "general",
"text": "BLF file parser crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0961",
"url": "https://www.suse.com/security/cve/CVE-2026-0961"
},
{
"category": "external",
"summary": "SUSE Bug 1256738 for CVE-2026-0961",
"url": "https://bugzilla.suse.com/1256738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-02T12:56:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-0961"
},
{
"cve": "CVE-2026-0962",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0962"
}
],
"notes": [
{
"category": "general",
"text": "SOME/IP-SD protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0962",
"url": "https://www.suse.com/security/cve/CVE-2026-0962"
},
{
"category": "external",
"summary": "SUSE Bug 1256739 for CVE-2026-0962",
"url": "https://bugzilla.suse.com/1256739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwireshark18-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwiretap15-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:libwsutil16-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-devel-4.4.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.s390x",
"openSUSE Leap 16.0:wireshark-ui-qt-4.4.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-02T12:56:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-0962"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…