SUSE SLED15 / SLES15 Security Update : wireshark (SUSE-SU-2026:1169-1)

high Nessus Plugin ID 304851

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1169-1 advisory.

Update Wireshark to version 4.6.4 (jsc#PED-15400).

- CVE-2024-9780: ITS dissector crash (bsc#1231475).
- CVE-2024-9781: AppleTalk and RELOAD Framing dissector crash (bsc#1231476).
- CVE-2024-11595: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark (bsc#1233594).
- CVE-2024-11596: Buffer Over-read in Wireshark (bsc#1233593).
- CVE-2025-1492: Uncontrolled Recursion in Wireshark (bsc#1237414).
- CVE-2025-5601: Column handling crashes in Wireshark allows denial of service (bsc#1244081).
- CVE-2025-9817: NULL Pointer Dereference in ssh dissector (bsc#1249090).
- CVE-2025-13499: a malformed packet can lead to a Kafka dissector crash (bsc#1254108).
- CVE-2025-13674: injecting a malformed packet can cause a crash (bsc#1254262).
- CVE-2025-13945: HTTP3 dissector crash in Wireshark 4.6.0 and 4.6.1 allows denial of service (bsc#1254471).
- CVE-2025-13946: MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service (bsc#1254472).
- CVE-2026-0959: denial of service via IEEE 802.11 protocol dissector crash (bsc#1256734).
- CVE-2026-0960: denial of Service via HTTP3 protocol dissector infinite loop (bsc#1256736).
- CVE-2026-0961: denial of Service vulnerability in BLF file parser (bsc#1256738).
- CVE-2026-0962: denial of Service via SOME/IP-SD protocol dissector crash (bsc#1256739).
- CVE-2026-3201: missing limit checks in USB HID protocol dissector's `parse_report_descriptor` function can lead to memory exhaustion (bsc#1258907).
- CVE-2026-3202: missing checks in NTS-KE protocol dissector can lead to crash (bsc#1258908).
- CVE-2026-3203: missing length checks in the RF4CE Profile protocol dissector can lead to illegal memory access and crash (bsc#1258909).

Also libvirt was rebuilt against wireshark for the libvirt plugin.

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1231476

https://www.suse.com/security/cve/CVE-2024-9781

https://bugzilla.suse.com/1233593

https://bugzilla.suse.com/1233594

https://www.suse.com/security/cve/CVE-2024-11595

https://www.suse.com/security/cve/CVE-2024-11596

https://bugzilla.suse.com/1237414

https://www.suse.com/security/cve/CVE-2025-1492

https://bugzilla.suse.com/1244081

https://www.suse.com/security/cve/CVE-2025-5601

https://bugzilla.suse.com/1249090

https://www.suse.com/security/cve/CVE-2025-9817

https://bugzilla.suse.com/1254108

https://bugzilla.suse.com/1254472

https://www.suse.com/security/cve/CVE-2025-13499

https://www.suse.com/security/cve/CVE-2025-13946

https://bugzilla.suse.com/1256734

https://bugzilla.suse.com/1256736

https://bugzilla.suse.com/1256739

https://www.suse.com/security/cve/CVE-2026-0959

https://www.suse.com/security/cve/CVE-2026-0960

https://www.suse.com/security/cve/CVE-2026-0962

https://bugzilla.suse.com/1254471

https://bugzilla.suse.com/1256738

https://www.suse.com/security/cve/CVE-2025-13945

https://www.suse.com/security/cve/CVE-2026-0961

https://bugzilla.suse.com/1258907

https://www.suse.com/security/cve/CVE-2026-3201

https://bugzilla.suse.com/1231475

https://bugzilla.suse.com/1254262

https://bugzilla.suse.com/1258908

https://bugzilla.suse.com/1258909

https://lists.suse.com/pipermail/sle-updates/2026-April/045264.html

https://www.suse.com/security/cve/CVE-2024-9780

https://www.suse.com/security/cve/CVE-2025-13674

https://www.suse.com/security/cve/CVE-2026-3202

https://www.suse.com/security/cve/CVE-2026-3203

Plugin Details

Severity: High

ID: 304851

File Name: suse_SU-2026-1169-1.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 4/4/2026

Updated: 4/4/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2026-3203

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:novell:suse_linux:libvirt-libs, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage, p-cpe:/a:novell:suse_linux:libvirt-daemon-hooks, p-cpe:/a:novell:suse_linux:libvirt-daemon-plugin-lockd, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:novell:suse_linux:libvirt-daemon-plugin-sanlock, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage-iscsi-direct, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage-core, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:novell:suse_linux:libvirt-daemon-qemu, p-cpe:/a:novell:suse_linux:libwsutil17, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:novell:suse_linux:libvirt-daemon-config-nwfilter, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-secret, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-libxl, p-cpe:/a:novell:suse_linux:libvirt-daemon-xen, p-cpe:/a:novell:suse_linux:libvirt-daemon-log, p-cpe:/a:novell:suse_linux:libwiretap16, p-cpe:/a:novell:suse_linux:wireshark-ui-qt, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-nodedev, p-cpe:/a:novell:suse_linux:wireshark, p-cpe:/a:novell:suse_linux:libvirt-doc, p-cpe:/a:novell:suse_linux:libvirt-daemon-common, p-cpe:/a:novell:suse_linux:libvirt-daemon-lock, p-cpe:/a:novell:suse_linux:libwireshark19, p-cpe:/a:novell:suse_linux:wireshark-devel, p-cpe:/a:novell:suse_linux:libvirt-devel, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-qemu, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:libvirt-daemon-config-network, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-network, p-cpe:/a:novell:suse_linux:libvirt-daemon, p-cpe:/a:novell:suse_linux:libvirt-client-qemu, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:novell:suse_linux:libvirt-client, p-cpe:/a:novell:suse_linux:libvirt-nss, p-cpe:/a:novell:suse_linux:libvirt, p-cpe:/a:novell:suse_linux:libvirt-daemon-proxy, p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-interface

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/2/2026

Vulnerability Publication Date: 10/8/2024

Reference Information

CVE: CVE-2024-11595, CVE-2024-11596, CVE-2024-9780, CVE-2024-9781, CVE-2025-13499, CVE-2025-13674, CVE-2025-13945, CVE-2025-13946, CVE-2025-1492, CVE-2025-5601, CVE-2025-9817, CVE-2026-0959, CVE-2026-0960, CVE-2026-0961, CVE-2026-0962, CVE-2026-3201, CVE-2026-3202, CVE-2026-3203

IAVB: 2024-B-0153-S, 2024-B-0185-S, 2025-B-0029-S, 2025-B-0086-S, 2025-B-0148-S, 2025-B-0193-S, 2025-B-0197-S, 2026-B-0022-S, 2026-B-0053

SuSE: SUSE-SU-2026:1169-1