Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-5654 (GCVE-0-2026-5654)
Vulnerability from cvelistv5 – Published: 2026-04-30 05:39 – Updated: 2026-04-30 13:02
VLAI?
EPSS
Title
Stack-based Buffer Overflow in Wireshark
Summary
AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity ?
5.5 (Medium)
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Wireshark Foundation | Wireshark |
Affected:
4.6.0 , < 4.6.5
(semver)
Affected: 4.4.0 , < 4.4.15 (semver) |
Credits
Alexandre de Oliveira
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-5654",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-30T13:02:16.666075Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-30T13:02:57.653Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://gitlab.com/wireshark/wireshark/-/work_items/21111"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Wireshark",
"vendor": "Wireshark Foundation",
"versions": [
{
"lessThan": "4.6.5",
"status": "affected",
"version": "4.6.0",
"versionType": "semver"
},
{
"lessThan": "4.4.15",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Alexandre de Oliveira"
}
],
"descriptions": [
{
"lang": "en",
"value": "AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121: Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-30T05:39:04.227Z",
"orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
"shortName": "GitLab"
},
"references": [
{
"url": "https://www.wireshark.org/security/wnpa-sec-2026-18.html"
},
{
"name": "GitLab Issue #21111",
"tags": [
"issue-tracking",
"permissions-required"
],
"url": "https://gitlab.com/wireshark/wireshark/-/issues/21111"
}
],
"solutions": [
{
"lang": "en",
"value": "Upgrade to version 4.6.5 or above"
}
],
"title": "Stack-based Buffer Overflow in Wireshark"
}
},
"cveMetadata": {
"assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
"assignerShortName": "GitLab",
"cveId": "CVE-2026-5654",
"datePublished": "2026-04-30T05:39:04.227Z",
"dateReserved": "2026-04-06T06:33:56.341Z",
"dateUpdated": "2026-04-30T13:02:57.653Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-5654",
"date": "2026-05-05",
"epss": "0.00017",
"percentile": "0.03994"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-5654\",\"sourceIdentifier\":\"cve@gitlab.com\",\"published\":\"2026-04-30T07:16:38.650\",\"lastModified\":\"2026-05-01T17:02:54.637\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@gitlab.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"cve@gitlab.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.0\",\"versionEndIncluding\":\"4.4.14\",\"matchCriteriaId\":\"77CF79F1-B53C-40A7-9570-A192D5A85ED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.6.0\",\"versionEndIncluding\":\"4.6.4\",\"matchCriteriaId\":\"B52139AE-161F-406A-B28D-F874CE8B68B6\"}]}]}],\"references\":[{\"url\":\"https://gitlab.com/wireshark/wireshark/-/issues/21111\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.wireshark.org/security/wnpa-sec-2026-18.html\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gitlab.com/wireshark/wireshark/-/work_items/21111\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-5654\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-30T13:02:16.666075Z\"}}}], \"references\": [{\"url\": \"https://gitlab.com/wireshark/wireshark/-/work_items/21111\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-30T13:01:54.821Z\"}}], \"cna\": {\"title\": \"Stack-based Buffer Overflow in Wireshark\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Alexandre de Oliveira\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Wireshark Foundation\", \"product\": \"Wireshark\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.6.0\", \"lessThan\": \"4.6.5\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"4.4.0\", \"lessThan\": \"4.4.15\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Upgrade to version 4.6.5 or above\"}], \"references\": [{\"url\": \"https://www.wireshark.org/security/wnpa-sec-2026-18.html\"}, {\"url\": \"https://gitlab.com/wireshark/wireshark/-/issues/21111\", \"name\": \"GitLab Issue #21111\", \"tags\": [\"issue-tracking\", \"permissions-required\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"CWE-121: Stack-based Buffer Overflow\"}]}], \"providerMetadata\": {\"orgId\": \"ceab7361-8a18-47b1-92ba-4d7d25f6715a\", \"shortName\": \"GitLab\", \"dateUpdated\": \"2026-04-30T05:39:04.227Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-5654\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-30T13:02:57.653Z\", \"dateReserved\": \"2026-04-06T06:33:56.341Z\", \"assignerOrgId\": \"ceab7361-8a18-47b1-92ba-4d7d25f6715a\", \"datePublished\": \"2026-04-30T05:39:04.227Z\", \"assignerShortName\": \"GitLab\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-WMQV-GF9G-F856
Vulnerability from github – Published: 2026-04-30 09:30 – Updated: 2026-04-30 15:30
VLAI?
Details
AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2026-5654"
],
"database_specific": {
"cwe_ids": [
"CWE-121"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-30T07:16:38Z",
"severity": "MODERATE"
},
"details": "AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"id": "GHSA-wmqv-gf9g-f856",
"modified": "2026-04-30T15:30:39Z",
"published": "2026-04-30T09:30:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5654"
},
{
"type": "WEB",
"url": "https://gitlab.com/wireshark/wireshark/-/issues/21111"
},
{
"type": "WEB",
"url": "https://gitlab.com/wireshark/wireshark/-/work_items/21111"
},
{
"type": "WEB",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-18.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2026:10686-1
Vulnerability from csaf_opensuse - Published: 2026-05-04 00:00 - Updated: 2026-05-04 00:00Summary
libwireshark19-4.6.5-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: libwireshark19-4.6.5-1.1 on GA media
Description of the patch: These are all security issues fixed in the libwireshark19-4.6.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2026-10686
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libwireshark19-4.6.5-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libwireshark19-4.6.5-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10686",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10686-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5299 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5299/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5401 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5402 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5403 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5404 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5405 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5406 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5407 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5408 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5409 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5653 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5654 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5654/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5655 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5656 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5657 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5657/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6519 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6520 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6520/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6521 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6521/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6522 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6522/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6523 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6524 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6525 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6526 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6527 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6528 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6528/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6529 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6529/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6530 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6530/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6531 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6531/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6532 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6532/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6533 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6533/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6534 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6534/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6535 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6536 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6537 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6538 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6538/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6867 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6868 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6869 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6870 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7375 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7376 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7378 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7379 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7379/"
}
],
"title": "libwireshark19-4.6.5-1.1 on GA media",
"tracking": {
"current_release_date": "2026-05-04T00:00:00Z",
"generator": {
"date": "2026-05-04T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10686-1",
"initial_release_date": "2026-05-04T00:00:00Z",
"revision_history": [
{
"date": "2026-05-04T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libwireshark19-4.6.5-1.1.aarch64",
"product": {
"name": "libwireshark19-4.6.5-1.1.aarch64",
"product_id": "libwireshark19-4.6.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libwiretap16-4.6.5-1.1.aarch64",
"product": {
"name": "libwiretap16-4.6.5-1.1.aarch64",
"product_id": "libwiretap16-4.6.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libwsutil17-4.6.5-1.1.aarch64",
"product": {
"name": "libwsutil17-4.6.5-1.1.aarch64",
"product_id": "libwsutil17-4.6.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "wireshark-4.6.5-1.1.aarch64",
"product": {
"name": "wireshark-4.6.5-1.1.aarch64",
"product_id": "wireshark-4.6.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "wireshark-devel-4.6.5-1.1.aarch64",
"product": {
"name": "wireshark-devel-4.6.5-1.1.aarch64",
"product_id": "wireshark-devel-4.6.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "wireshark-ui-qt-4.6.5-1.1.aarch64",
"product": {
"name": "wireshark-ui-qt-4.6.5-1.1.aarch64",
"product_id": "wireshark-ui-qt-4.6.5-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libwireshark19-4.6.5-1.1.ppc64le",
"product": {
"name": "libwireshark19-4.6.5-1.1.ppc64le",
"product_id": "libwireshark19-4.6.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libwiretap16-4.6.5-1.1.ppc64le",
"product": {
"name": "libwiretap16-4.6.5-1.1.ppc64le",
"product_id": "libwiretap16-4.6.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libwsutil17-4.6.5-1.1.ppc64le",
"product": {
"name": "libwsutil17-4.6.5-1.1.ppc64le",
"product_id": "libwsutil17-4.6.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wireshark-4.6.5-1.1.ppc64le",
"product": {
"name": "wireshark-4.6.5-1.1.ppc64le",
"product_id": "wireshark-4.6.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wireshark-devel-4.6.5-1.1.ppc64le",
"product": {
"name": "wireshark-devel-4.6.5-1.1.ppc64le",
"product_id": "wireshark-devel-4.6.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wireshark-ui-qt-4.6.5-1.1.ppc64le",
"product": {
"name": "wireshark-ui-qt-4.6.5-1.1.ppc64le",
"product_id": "wireshark-ui-qt-4.6.5-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libwireshark19-4.6.5-1.1.s390x",
"product": {
"name": "libwireshark19-4.6.5-1.1.s390x",
"product_id": "libwireshark19-4.6.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libwiretap16-4.6.5-1.1.s390x",
"product": {
"name": "libwiretap16-4.6.5-1.1.s390x",
"product_id": "libwiretap16-4.6.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libwsutil17-4.6.5-1.1.s390x",
"product": {
"name": "libwsutil17-4.6.5-1.1.s390x",
"product_id": "libwsutil17-4.6.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "wireshark-4.6.5-1.1.s390x",
"product": {
"name": "wireshark-4.6.5-1.1.s390x",
"product_id": "wireshark-4.6.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "wireshark-devel-4.6.5-1.1.s390x",
"product": {
"name": "wireshark-devel-4.6.5-1.1.s390x",
"product_id": "wireshark-devel-4.6.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "wireshark-ui-qt-4.6.5-1.1.s390x",
"product": {
"name": "wireshark-ui-qt-4.6.5-1.1.s390x",
"product_id": "wireshark-ui-qt-4.6.5-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libwireshark19-4.6.5-1.1.x86_64",
"product": {
"name": "libwireshark19-4.6.5-1.1.x86_64",
"product_id": "libwireshark19-4.6.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libwiretap16-4.6.5-1.1.x86_64",
"product": {
"name": "libwiretap16-4.6.5-1.1.x86_64",
"product_id": "libwiretap16-4.6.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libwsutil17-4.6.5-1.1.x86_64",
"product": {
"name": "libwsutil17-4.6.5-1.1.x86_64",
"product_id": "libwsutil17-4.6.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-4.6.5-1.1.x86_64",
"product": {
"name": "wireshark-4.6.5-1.1.x86_64",
"product_id": "wireshark-4.6.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-devel-4.6.5-1.1.x86_64",
"product": {
"name": "wireshark-devel-4.6.5-1.1.x86_64",
"product_id": "wireshark-devel-4.6.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-ui-qt-4.6.5-1.1.x86_64",
"product": {
"name": "wireshark-ui-qt-4.6.5-1.1.x86_64",
"product_id": "wireshark-ui-qt-4.6.5-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libwireshark19-4.6.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64"
},
"product_reference": "libwireshark19-4.6.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwireshark19-4.6.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le"
},
"product_reference": "libwireshark19-4.6.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwireshark19-4.6.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x"
},
"product_reference": "libwireshark19-4.6.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwireshark19-4.6.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64"
},
"product_reference": "libwireshark19-4.6.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwiretap16-4.6.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64"
},
"product_reference": "libwiretap16-4.6.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwiretap16-4.6.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le"
},
"product_reference": "libwiretap16-4.6.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwiretap16-4.6.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x"
},
"product_reference": "libwiretap16-4.6.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwiretap16-4.6.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64"
},
"product_reference": "libwiretap16-4.6.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwsutil17-4.6.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64"
},
"product_reference": "libwsutil17-4.6.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwsutil17-4.6.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le"
},
"product_reference": "libwsutil17-4.6.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwsutil17-4.6.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x"
},
"product_reference": "libwsutil17-4.6.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwsutil17-4.6.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64"
},
"product_reference": "libwsutil17-4.6.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-4.6.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64"
},
"product_reference": "wireshark-4.6.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-4.6.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le"
},
"product_reference": "wireshark-4.6.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-4.6.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x"
},
"product_reference": "wireshark-4.6.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-4.6.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64"
},
"product_reference": "wireshark-4.6.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-4.6.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64"
},
"product_reference": "wireshark-devel-4.6.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-4.6.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le"
},
"product_reference": "wireshark-devel-4.6.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-4.6.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x"
},
"product_reference": "wireshark-devel-4.6.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-4.6.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64"
},
"product_reference": "wireshark-devel-4.6.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-ui-qt-4.6.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64"
},
"product_reference": "wireshark-ui-qt-4.6.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-ui-qt-4.6.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le"
},
"product_reference": "wireshark-ui-qt-4.6.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-ui-qt-4.6.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x"
},
"product_reference": "wireshark-ui-qt-4.6.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-ui-qt-4.6.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
},
"product_reference": "wireshark-ui-qt-4.6.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-5299",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5299"
}
],
"notes": [
{
"category": "general",
"text": "ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5299",
"url": "https://www.suse.com/security/cve/CVE-2026-5299"
},
{
"category": "external",
"summary": "SUSE Bug 1263757 for CVE-2026-5299",
"url": "https://bugzilla.suse.com/1263757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5299"
},
{
"cve": "CVE-2026-5401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5401"
}
],
"notes": [
{
"category": "general",
"text": "AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5401",
"url": "https://www.suse.com/security/cve/CVE-2026-5401"
},
{
"category": "external",
"summary": "SUSE Bug 1263756 for CVE-2026-5401",
"url": "https://bugzilla.suse.com/1263756"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5401"
},
{
"cve": "CVE-2026-5402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5402"
}
],
"notes": [
{
"category": "general",
"text": "TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5402",
"url": "https://www.suse.com/security/cve/CVE-2026-5402"
},
{
"category": "external",
"summary": "SUSE Bug 1263755 for CVE-2026-5402",
"url": "https://bugzilla.suse.com/1263755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-5402"
},
{
"cve": "CVE-2026-5403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5403"
}
],
"notes": [
{
"category": "general",
"text": "SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5403",
"url": "https://www.suse.com/security/cve/CVE-2026-5403"
},
{
"category": "external",
"summary": "SUSE Bug 1263765 for CVE-2026-5403",
"url": "https://bugzilla.suse.com/1263765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5403"
},
{
"cve": "CVE-2026-5404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5404"
}
],
"notes": [
{
"category": "general",
"text": "K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5404",
"url": "https://www.suse.com/security/cve/CVE-2026-5404"
},
{
"category": "external",
"summary": "SUSE Bug 1263766 for CVE-2026-5404",
"url": "https://bugzilla.suse.com/1263766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5404"
},
{
"cve": "CVE-2026-5405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5405"
}
],
"notes": [
{
"category": "general",
"text": "RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5405",
"url": "https://www.suse.com/security/cve/CVE-2026-5405"
},
{
"category": "external",
"summary": "SUSE Bug 1263767 for CVE-2026-5405",
"url": "https://bugzilla.suse.com/1263767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-5405"
},
{
"cve": "CVE-2026-5406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5406"
}
],
"notes": [
{
"category": "general",
"text": "FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5406",
"url": "https://www.suse.com/security/cve/CVE-2026-5406"
},
{
"category": "external",
"summary": "SUSE Bug 1263754 for CVE-2026-5406",
"url": "https://bugzilla.suse.com/1263754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5406"
},
{
"cve": "CVE-2026-5407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5407"
}
],
"notes": [
{
"category": "general",
"text": "SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5407",
"url": "https://www.suse.com/security/cve/CVE-2026-5407"
},
{
"category": "external",
"summary": "SUSE Bug 1263753 for CVE-2026-5407",
"url": "https://bugzilla.suse.com/1263753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5407"
},
{
"cve": "CVE-2026-5408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5408"
}
],
"notes": [
{
"category": "general",
"text": "BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5408",
"url": "https://www.suse.com/security/cve/CVE-2026-5408"
},
{
"category": "external",
"summary": "SUSE Bug 1263752 for CVE-2026-5408",
"url": "https://bugzilla.suse.com/1263752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5408"
},
{
"cve": "CVE-2026-5409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5409"
}
],
"notes": [
{
"category": "general",
"text": "Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5409",
"url": "https://www.suse.com/security/cve/CVE-2026-5409"
},
{
"category": "external",
"summary": "SUSE Bug 1263751 for CVE-2026-5409",
"url": "https://bugzilla.suse.com/1263751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5409"
},
{
"cve": "CVE-2026-5653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5653"
}
],
"notes": [
{
"category": "general",
"text": "DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5653",
"url": "https://www.suse.com/security/cve/CVE-2026-5653"
},
{
"category": "external",
"summary": "SUSE Bug 1263750 for CVE-2026-5653",
"url": "https://bugzilla.suse.com/1263750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5653"
},
{
"cve": "CVE-2026-5654",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5654"
}
],
"notes": [
{
"category": "general",
"text": "AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5654",
"url": "https://www.suse.com/security/cve/CVE-2026-5654"
},
{
"category": "external",
"summary": "SUSE Bug 1263749 for CVE-2026-5654",
"url": "https://bugzilla.suse.com/1263749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5654"
},
{
"cve": "CVE-2026-5655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5655"
}
],
"notes": [
{
"category": "general",
"text": "SDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5655",
"url": "https://www.suse.com/security/cve/CVE-2026-5655"
},
{
"category": "external",
"summary": "SUSE Bug 1263748 for CVE-2026-5655",
"url": "https://bugzilla.suse.com/1263748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5655"
},
{
"cve": "CVE-2026-5656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5656"
}
],
"notes": [
{
"category": "general",
"text": "Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5656",
"url": "https://www.suse.com/security/cve/CVE-2026-5656"
},
{
"category": "external",
"summary": "SUSE Bug 1263809 for CVE-2026-5656",
"url": "https://bugzilla.suse.com/1263809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-5656"
},
{
"cve": "CVE-2026-5657",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5657"
}
],
"notes": [
{
"category": "general",
"text": "iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5657",
"url": "https://www.suse.com/security/cve/CVE-2026-5657"
},
{
"category": "external",
"summary": "SUSE Bug 1263747 for CVE-2026-5657",
"url": "https://bugzilla.suse.com/1263747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5657"
},
{
"cve": "CVE-2026-6519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6519"
}
],
"notes": [
{
"category": "general",
"text": "MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6519",
"url": "https://www.suse.com/security/cve/CVE-2026-6519"
},
{
"category": "external",
"summary": "SUSE Bug 1263746 for CVE-2026-6519",
"url": "https://bugzilla.suse.com/1263746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6519"
},
{
"cve": "CVE-2026-6520",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6520"
}
],
"notes": [
{
"category": "general",
"text": "OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6520",
"url": "https://www.suse.com/security/cve/CVE-2026-6520"
},
{
"category": "external",
"summary": "SUSE Bug 1263745 for CVE-2026-6520",
"url": "https://bugzilla.suse.com/1263745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6520"
},
{
"cve": "CVE-2026-6521",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6521"
}
],
"notes": [
{
"category": "general",
"text": "OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6521",
"url": "https://www.suse.com/security/cve/CVE-2026-6521"
},
{
"category": "external",
"summary": "SUSE Bug 1263744 for CVE-2026-6521",
"url": "https://bugzilla.suse.com/1263744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6521"
},
{
"cve": "CVE-2026-6522",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6522"
}
],
"notes": [
{
"category": "general",
"text": "RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6522",
"url": "https://www.suse.com/security/cve/CVE-2026-6522"
},
{
"category": "external",
"summary": "SUSE Bug 1263743 for CVE-2026-6522",
"url": "https://bugzilla.suse.com/1263743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6522"
},
{
"cve": "CVE-2026-6523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6523"
}
],
"notes": [
{
"category": "general",
"text": "GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6523",
"url": "https://www.suse.com/security/cve/CVE-2026-6523"
},
{
"category": "external",
"summary": "SUSE Bug 1263742 for CVE-2026-6523",
"url": "https://bugzilla.suse.com/1263742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6523"
},
{
"cve": "CVE-2026-6524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6524"
}
],
"notes": [
{
"category": "general",
"text": "MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6524",
"url": "https://www.suse.com/security/cve/CVE-2026-6524"
},
{
"category": "external",
"summary": "SUSE Bug 1263741 for CVE-2026-6524",
"url": "https://bugzilla.suse.com/1263741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6524"
},
{
"cve": "CVE-2026-6525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6525"
}
],
"notes": [
{
"category": "general",
"text": "IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to 4.6.4",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6525",
"url": "https://www.suse.com/security/cve/CVE-2026-6525"
},
{
"category": "external",
"summary": "SUSE Bug 1263810 for CVE-2026-6525",
"url": "https://bugzilla.suse.com/1263810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6525"
},
{
"cve": "CVE-2026-6526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6526"
}
],
"notes": [
{
"category": "general",
"text": "RTSP protocol dissector crash in Wireshark 4.6.0 to 4.6.4",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6526",
"url": "https://www.suse.com/security/cve/CVE-2026-6526"
},
{
"category": "external",
"summary": "SUSE Bug 1263740 for CVE-2026-6526",
"url": "https://bugzilla.suse.com/1263740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6526"
},
{
"cve": "CVE-2026-6527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6527"
}
],
"notes": [
{
"category": "general",
"text": "ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6527",
"url": "https://www.suse.com/security/cve/CVE-2026-6527"
},
{
"category": "external",
"summary": "SUSE Bug 1263739 for CVE-2026-6527",
"url": "https://bugzilla.suse.com/1263739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6527"
},
{
"cve": "CVE-2026-6528",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6528"
}
],
"notes": [
{
"category": "general",
"text": "TLS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6528",
"url": "https://www.suse.com/security/cve/CVE-2026-6528"
},
{
"category": "external",
"summary": "SUSE Bug 1263738 for CVE-2026-6528",
"url": "https://bugzilla.suse.com/1263738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6528"
},
{
"cve": "CVE-2026-6529",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6529"
}
],
"notes": [
{
"category": "general",
"text": "iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6529",
"url": "https://www.suse.com/security/cve/CVE-2026-6529"
},
{
"category": "external",
"summary": "SUSE Bug 1263737 for CVE-2026-6529",
"url": "https://bugzilla.suse.com/1263737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6529"
},
{
"cve": "CVE-2026-6530",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6530"
}
],
"notes": [
{
"category": "general",
"text": "DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6530",
"url": "https://www.suse.com/security/cve/CVE-2026-6530"
},
{
"category": "external",
"summary": "SUSE Bug 1263736 for CVE-2026-6530",
"url": "https://bugzilla.suse.com/1263736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6530"
},
{
"cve": "CVE-2026-6531",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6531"
}
],
"notes": [
{
"category": "general",
"text": "SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6531",
"url": "https://www.suse.com/security/cve/CVE-2026-6531"
},
{
"category": "external",
"summary": "SUSE Bug 1263735 for CVE-2026-6531",
"url": "https://bugzilla.suse.com/1263735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6531"
},
{
"cve": "CVE-2026-6532",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6532"
}
],
"notes": [
{
"category": "general",
"text": "Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6532",
"url": "https://www.suse.com/security/cve/CVE-2026-6532"
},
{
"category": "external",
"summary": "SUSE Bug 1263734 for CVE-2026-6532",
"url": "https://bugzilla.suse.com/1263734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6532"
},
{
"cve": "CVE-2026-6533",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6533"
}
],
"notes": [
{
"category": "general",
"text": "Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6533",
"url": "https://www.suse.com/security/cve/CVE-2026-6533"
},
{
"category": "external",
"summary": "SUSE Bug 1263733 for CVE-2026-6533",
"url": "https://bugzilla.suse.com/1263733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6533"
},
{
"cve": "CVE-2026-6534",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6534"
}
],
"notes": [
{
"category": "general",
"text": "USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6534",
"url": "https://www.suse.com/security/cve/CVE-2026-6534"
},
{
"category": "external",
"summary": "SUSE Bug 1263732 for CVE-2026-6534",
"url": "https://bugzilla.suse.com/1263732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6534"
},
{
"cve": "CVE-2026-6535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6535"
}
],
"notes": [
{
"category": "general",
"text": "Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6535",
"url": "https://www.suse.com/security/cve/CVE-2026-6535"
},
{
"category": "external",
"summary": "SUSE Bug 1263731 for CVE-2026-6535",
"url": "https://bugzilla.suse.com/1263731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6535"
},
{
"cve": "CVE-2026-6536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6536"
}
],
"notes": [
{
"category": "general",
"text": "DLMS/COSEM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6536",
"url": "https://www.suse.com/security/cve/CVE-2026-6536"
},
{
"category": "external",
"summary": "SUSE Bug 1263730 for CVE-2026-6536",
"url": "https://bugzilla.suse.com/1263730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6536"
},
{
"cve": "CVE-2026-6537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6537"
}
],
"notes": [
{
"category": "general",
"text": "ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6537",
"url": "https://www.suse.com/security/cve/CVE-2026-6537"
},
{
"category": "external",
"summary": "SUSE Bug 1263729 for CVE-2026-6537",
"url": "https://bugzilla.suse.com/1263729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6537"
},
{
"cve": "CVE-2026-6538",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6538"
}
],
"notes": [
{
"category": "general",
"text": "BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6538",
"url": "https://www.suse.com/security/cve/CVE-2026-6538"
},
{
"category": "external",
"summary": "SUSE Bug 1263728 for CVE-2026-6538",
"url": "https://bugzilla.suse.com/1263728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6538"
},
{
"cve": "CVE-2026-6867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6867"
}
],
"notes": [
{
"category": "general",
"text": "SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6867",
"url": "https://www.suse.com/security/cve/CVE-2026-6867"
},
{
"category": "external",
"summary": "SUSE Bug 1263727 for CVE-2026-6867",
"url": "https://bugzilla.suse.com/1263727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6867"
},
{
"cve": "CVE-2026-6868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6868"
}
],
"notes": [
{
"category": "general",
"text": "HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6868",
"url": "https://www.suse.com/security/cve/CVE-2026-6868"
},
{
"category": "external",
"summary": "SUSE Bug 1263762 for CVE-2026-6868",
"url": "https://bugzilla.suse.com/1263762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6868"
},
{
"cve": "CVE-2026-6869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6869"
}
],
"notes": [
{
"category": "general",
"text": "WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6869",
"url": "https://www.suse.com/security/cve/CVE-2026-6869"
},
{
"category": "external",
"summary": "SUSE Bug 1263726 for CVE-2026-6869",
"url": "https://bugzilla.suse.com/1263726"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6869"
},
{
"cve": "CVE-2026-6870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6870"
}
],
"notes": [
{
"category": "general",
"text": "GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6870",
"url": "https://www.suse.com/security/cve/CVE-2026-6870"
},
{
"category": "external",
"summary": "SUSE Bug 1263725 for CVE-2026-6870",
"url": "https://bugzilla.suse.com/1263725"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-6870"
},
{
"cve": "CVE-2026-7375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7375"
}
],
"notes": [
{
"category": "general",
"text": "UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7375",
"url": "https://www.suse.com/security/cve/CVE-2026-7375"
},
{
"category": "external",
"summary": "SUSE Bug 1263761 for CVE-2026-7375",
"url": "https://bugzilla.suse.com/1263761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-7375"
},
{
"cve": "CVE-2026-7376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7376"
}
],
"notes": [
{
"category": "general",
"text": "Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7376",
"url": "https://www.suse.com/security/cve/CVE-2026-7376"
},
{
"category": "external",
"summary": "SUSE Bug 1263760 for CVE-2026-7376",
"url": "https://bugzilla.suse.com/1263760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-7376"
},
{
"cve": "CVE-2026-7378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7378"
}
],
"notes": [
{
"category": "general",
"text": "Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7378",
"url": "https://www.suse.com/security/cve/CVE-2026-7378"
},
{
"category": "external",
"summary": "SUSE Bug 1263759 for CVE-2026-7378",
"url": "https://bugzilla.suse.com/1263759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-7378"
},
{
"cve": "CVE-2026-7379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7379"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7379",
"url": "https://www.suse.com/security/cve/CVE-2026-7379"
},
{
"category": "external",
"summary": "SUSE Bug 1263758 for CVE-2026-7379",
"url": "https://bugzilla.suse.com/1263758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwireshark19-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwiretap16-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:libwsutil17-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-devel-4.6.5-1.1.x86_64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.aarch64",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.ppc64le",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.s390x",
"openSUSE Tumbleweed:wireshark-ui-qt-4.6.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-7379"
}
]
}
CERTFR-2026-AVI-0518
Vulnerability from certfr_avis - Published: 2026-04-30 - Updated: 2026-04-30
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.6.x ant\u00e9rieures \u00e0 4.6.5",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.15",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-5404",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5404"
},
{
"name": "CVE-2026-6538",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6538"
},
{
"name": "CVE-2026-6530",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6530"
},
{
"name": "CVE-2026-6527",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6527"
},
{
"name": "CVE-2026-5408",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5408"
},
{
"name": "CVE-2026-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6525"
},
{
"name": "CVE-2026-6520",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6520"
},
{
"name": "CVE-2026-6869",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6869"
},
{
"name": "CVE-2026-6533",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6533"
},
{
"name": "CVE-2026-6868",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6868"
},
{
"name": "CVE-2026-6532",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6532"
},
{
"name": "CVE-2026-5405",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5405"
},
{
"name": "CVE-2026-6528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6528"
},
{
"name": "CVE-2026-5654",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5654"
},
{
"name": "CVE-2026-5406",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5406"
},
{
"name": "CVE-2026-5409",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5409"
},
{
"name": "CVE-2026-6522",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6522"
},
{
"name": "CVE-2026-5656",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5656"
},
{
"name": "CVE-2026-5402",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5402"
},
{
"name": "CVE-2026-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5407"
},
{
"name": "CVE-2026-5655",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5655"
},
{
"name": "CVE-2026-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6519"
},
{
"name": "CVE-2026-6537",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6537"
},
{
"name": "CVE-2026-6529",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6529"
},
{
"name": "CVE-2026-6867",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6867"
},
{
"name": "CVE-2026-6524",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6524"
},
{
"name": "CVE-2026-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6531"
},
{
"name": "CVE-2026-6870",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6870"
},
{
"name": "CVE-2026-5403",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5403"
},
{
"name": "CVE-2026-6521",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6521"
},
{
"name": "CVE-2026-5657",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5657"
},
{
"name": "CVE-2026-5653",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5653"
},
{
"name": "CVE-2026-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6535"
},
{
"name": "CVE-2026-6523",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6523"
},
{
"name": "CVE-2026-6534",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6534"
},
{
"name": "CVE-2026-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6536"
},
{
"name": "CVE-2026-6526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6526"
},
{
"name": "CVE-2026-5401",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5401"
},
{
"name": "CVE-2026-5299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5299"
}
],
"initial_release_date": "2026-04-30T00:00:00",
"last_revision_date": "2026-04-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0518",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-48",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-48.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-38",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-38.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-40",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-40.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-08",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-08.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-32",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-32.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-12",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-12.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-25",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-25.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-27",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-27.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-35",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-35.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-24",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-24.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-50",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-50.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-47",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-47.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-46",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-46.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-22",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-22.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-21",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-21.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-09",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-09.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-23",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-23.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-13",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-13.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-10",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-10.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-34",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-34.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-19",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-19.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-28",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-28.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-29",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-29.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-16",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-16.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-15",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-15.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-42",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-42.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-17",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-17.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-18",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-18.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-44",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-44.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-37",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-37.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-30",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-30.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-41",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-41.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-20",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-20.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-14",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-14.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-45",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-45.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-11",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-11.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-31",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-31.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-39",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-39.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-36",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-36.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-43",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-43.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-33",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-33.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-49",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-49.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-26",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-26.html"
}
]
}
FKIE_CVE-2026-5654
Vulnerability from fkie_nvd - Published: 2026-04-30 07:16 - Updated: 2026-05-01 17:02
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
References
| URL | Tags | ||
|---|---|---|---|
| cve@gitlab.com | https://gitlab.com/wireshark/wireshark/-/issues/21111 | Exploit, Issue Tracking, Third Party Advisory | |
| cve@gitlab.com | https://www.wireshark.org/security/wnpa-sec-2026-18.html | Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://gitlab.com/wireshark/wireshark/-/work_items/21111 | Exploit, Issue Tracking, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77CF79F1-B53C-40A7-9570-A192D5A85ED6",
"versionEndIncluding": "4.4.14",
"versionStartIncluding": "4.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B52139AE-161F-406A-B28D-F874CE8B68B6",
"versionEndIncluding": "4.6.4",
"versionStartIncluding": "4.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service"
}
],
"id": "CVE-2026-5654",
"lastModified": "2026-05-01T17:02:54.637",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "cve@gitlab.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-04-30T07:16:38.650",
"references": [
{
"source": "cve@gitlab.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gitlab.com/wireshark/wireshark/-/issues/21111"
},
{
"source": "cve@gitlab.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.wireshark.org/security/wnpa-sec-2026-18.html"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gitlab.com/wireshark/wireshark/-/work_items/21111"
}
],
"sourceIdentifier": "cve@gitlab.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "cve@gitlab.com",
"type": "Secondary"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…