www.suse.com Open in urlscan Pro
18.245.86.98  Public Scan

URL: https://www.suse.com/security/cve/CVE-2023-46752.html
Submission: On November 03 via api from IN — Scanned from DE

Form analysis 1 forms found in the DOM

https://www.suse.com/search/

<form id="searchform" action="https://www.suse.com/search/">
  <input type="text" class="search-text" name="s" placeholder="Search">
  <button type="submit" class="fa fa-search search-submit" aria-hidden="true"></button>
</form>

Text Content

Exit SUSE Federal  >
Careers

Customer Center

Account

HI

Update Your Account Log Out
Login Create an Account Update Your Account

English  

LANGUAGE

Choose Your Language

Deutsch English Español Français 中文(简体) 日本語 Português (Brasil)

EXPLORE

See what's happening around the world

Polska 대한민국



Shop
View Cart
Exit SUSE Federal  >
Shop Careers
Federal Solutions
Back

IT Modernization


SAP Solutions


AI and Analytics


Hybrid Cloud Solutions


Nonstop IT


Exit Federal Government

Products
Back

BUSINESS-CRITICAL LINUX

 * SUSE Linux Enterprise Server
   
   
   Run your business-critical apps in any environment

 * SUSE Linux Enterprise Server for SAP Applications
   
   
   #1 operating system to run SAP workloads

 * SUSE Manager
   
   
   Infrastructure Management

ENTERPRISE CONTAINER MANAGEMENT

 * Rancher
   
   
   Kubernetes Management

 * Harvester
   
   
   Hyperconverged Infrastructure

 * NeuVector
   
   
   Zero Trust Container Security

EDGE

 * K3s
   
   
   Lightweight Kubernetes built for Edge use cases

 * SUSE Linux Enterprise Micro
   
   
   Ultra-reliable, immutable Linux operating system

 * SUSE Linux Enterprise Real Time
   
   
   Reduce system latencies & boost response times

All Products
 * Run SAP
 * SUSE for Public Cloud
 * Security

Solutions
Back

SOLUTIONS

Business-critical Linux

Run & secure cloud and on-prem workloads

Run SAP

Deliver mission-critical SAP solutions

Enterprise Container Management

Orchestrate cloud-native apps

Edge

Deploy intelligent devices to the edge

SUSE for Public Cloud

Accelerate innovation across your clouds

Security

Secure your digital enterprise

INDUSTRIES

 * Automotive
 * Telecom
 * Banking and Financial Services
 * Healthcare
 * Manufacturing
 * Retail
 * Technology & Software
 * Federal
 * Pharma
 * Energy

Support
Back

SUPPORT

Product Support
Premium Support Services

Dedicated support services from a premium team


Long Term Service Support

Stay on your existing product version


SUSE Liberty Linux

Mixed Linux Environment Support


Renew Your Support Subscription


SERVICES

Consulting Services
Training & Certification
Premium Technical Advisory Services


RESOURCES

SUSE Support User Guide
Patches & Updates
Product Documentation
Knowledgebase
SUSE Customer Center
Product Support Life Cycle
Licensing
Package Hub

Community packages for SUSE Linux Enterprise Server


Driver Search
Support Forums
Developer Services
Beta Program
Security

Partners
Back

PARTNERS

Partner Program


Find a Partner


Become a Partner


Login to the SUSE Partner Portal

Communities
Back

COMMUNITIES

Community


Blog


Forum


Academic


Open Source Projects


openSUSE.org



SUSE Polska

About
Back

ABOUT

About Us


Leadership


Careers


Newsroom


Success Stories


Investor Relations


Social Impact


SUSE Logo and Brand


Events & Webinars


Merchandise Store


Communications Preferences

Contact Us

Free Downloads
 
 
 
 
X




CVE-2023-46752


COMMON VULNERABILITIES AND EXPOSURES

[Previous] [Index] [Next]


UPSTREAM INFORMATION

CVE-2023-46752 at MITRE

DESCRIPTION

An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed
MP_REACH_NLRI data, leading to a crash.

--------------------------------------------------------------------------------


SUSE INFORMATION

Overall state of this security issue: Pending

This issue is currently rated as having moderate severity.

CVSS v3 Scores   SUSE Base Score 5.9 Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Attack Vector Network Attack
Complexity High Privileges Required None User Interaction None Scope Unchanged
Confidentiality Impact None Integrity Impact None Availability Impact High
CVSSv3 Version 3.1

SUSE Bugzilla entry: 1216627 [IN_PROGRESS]

No SUSE Security Announcements cross referenced.




LIST OF RELEASED PACKAGES

Product(s) Fixed package version(s) References openSUSE Tumbleweed
 * frr >= 8.4-7.1
 * frr-devel >= 8.4-7.1
 * libfrr0 >= 8.4-7.1
 * libfrr_pb0 >= 8.4-7.1
 * libfrrcares0 >= 8.4-7.1
 * libfrrfpm_pb0 >= 8.4-7.1
 * libfrrospfapiclient0 >= 8.4-7.1
 * libfrrsnmp0 >= 8.4-7.1
 * libfrrzmq0 >= 8.4-7.1
 * libmlag_pb0 >= 8.4-7.1

Patchnames:
openSUSE Tumbleweed GA frr-8.4-7.1




LIST OF PACKAGES IN QA

Product(s) Package(s) SUSE Linux Enterprise Module for Server Applications 15
SP4
 * frr >= 7.4-150300.4.20.1
 * frr-devel >= 7.4-150300.4.20.1
 * libfrr0 >= 7.4-150300.4.20.1
 * libfrr_pb0 >= 7.4-150300.4.20.1
 * libfrrcares0 >= 7.4-150300.4.20.1
 * libfrrfpm_pb0 >= 7.4-150300.4.20.1
 * libfrrgrpc_pb0 >= 7.4-150300.4.20.1
 * libfrrospfapiclient0 >= 7.4-150300.4.20.1
 * libfrrsnmp0 >= 7.4-150300.4.20.1
 * libfrrzmq0 >= 7.4-150300.4.20.1
 * libmlag_pb0 >= 7.4-150300.4.20.1

SUSE Linux Enterprise Server 15 SP4
 * frr >= 7.4-150300.4.20.1
 * frr-devel >= 7.4-150300.4.20.1
 * libfrr0 >= 7.4-150300.4.20.1
 * libfrr_pb0 >= 7.4-150300.4.20.1
 * libfrrcares0 >= 7.4-150300.4.20.1
 * libfrrfpm_pb0 >= 7.4-150300.4.20.1
 * libfrrgrpc_pb0 >= 7.4-150300.4.20.1
 * libfrrospfapiclient0 >= 7.4-150300.4.20.1
 * libfrrsnmp0 >= 7.4-150300.4.20.1
 * libfrrzmq0 >= 7.4-150300.4.20.1
 * libmlag_pb0 >= 7.4-150300.4.20.1

SUSE Linux Enterprise Server for SAP Applications 15 SP4
 * frr >= 7.4-150300.4.20.1
 * frr-devel >= 7.4-150300.4.20.1
 * libfrr0 >= 7.4-150300.4.20.1
 * libfrr_pb0 >= 7.4-150300.4.20.1
 * libfrrcares0 >= 7.4-150300.4.20.1
 * libfrrfpm_pb0 >= 7.4-150300.4.20.1
 * libfrrgrpc_pb0 >= 7.4-150300.4.20.1
 * libfrrospfapiclient0 >= 7.4-150300.4.20.1
 * libfrrsnmp0 >= 7.4-150300.4.20.1
 * libfrrzmq0 >= 7.4-150300.4.20.1
 * libmlag_pb0 >= 7.4-150300.4.20.1

SUSE Linux Enterprise High Performance Computing 15 SP4
 * frr >= 7.4-150300.4.20.1
 * frr-devel >= 7.4-150300.4.20.1
 * libfrr0 >= 7.4-150300.4.20.1
 * libfrr_pb0 >= 7.4-150300.4.20.1
 * libfrrcares0 >= 7.4-150300.4.20.1
 * libfrrfpm_pb0 >= 7.4-150300.4.20.1
 * libfrrgrpc_pb0 >= 7.4-150300.4.20.1
 * libfrrospfapiclient0 >= 7.4-150300.4.20.1
 * libfrrsnmp0 >= 7.4-150300.4.20.1
 * libfrrzmq0 >= 7.4-150300.4.20.1
 * libmlag_pb0 >= 7.4-150300.4.20.1

SUSE Manager Server 4.3
 * frr >= 7.4-150300.4.20.1
 * frr-devel >= 7.4-150300.4.20.1
 * libfrr0 >= 7.4-150300.4.20.1
 * libfrr_pb0 >= 7.4-150300.4.20.1
 * libfrrcares0 >= 7.4-150300.4.20.1
 * libfrrfpm_pb0 >= 7.4-150300.4.20.1
 * libfrrgrpc_pb0 >= 7.4-150300.4.20.1
 * libfrrospfapiclient0 >= 7.4-150300.4.20.1
 * libfrrsnmp0 >= 7.4-150300.4.20.1
 * libfrrzmq0 >= 7.4-150300.4.20.1
 * libmlag_pb0 >= 7.4-150300.4.20.1

SUSE Manager Proxy 4.3
 * frr >= 7.4-150300.4.20.1
 * frr-devel >= 7.4-150300.4.20.1
 * libfrr0 >= 7.4-150300.4.20.1
 * libfrr_pb0 >= 7.4-150300.4.20.1
 * libfrrcares0 >= 7.4-150300.4.20.1
 * libfrrfpm_pb0 >= 7.4-150300.4.20.1
 * libfrrgrpc_pb0 >= 7.4-150300.4.20.1
 * libfrrospfapiclient0 >= 7.4-150300.4.20.1
 * libfrrsnmp0 >= 7.4-150300.4.20.1
 * libfrrzmq0 >= 7.4-150300.4.20.1
 * libmlag_pb0 >= 7.4-150300.4.20.1

SUSE Manager Retail Branch Server 4.3
 * frr >= 7.4-150300.4.20.1
 * frr-devel >= 7.4-150300.4.20.1
 * libfrr0 >= 7.4-150300.4.20.1
 * libfrr_pb0 >= 7.4-150300.4.20.1
 * libfrrcares0 >= 7.4-150300.4.20.1
 * libfrrfpm_pb0 >= 7.4-150300.4.20.1
 * libfrrgrpc_pb0 >= 7.4-150300.4.20.1
 * libfrrospfapiclient0 >= 7.4-150300.4.20.1
 * libfrrsnmp0 >= 7.4-150300.4.20.1
 * libfrrzmq0 >= 7.4-150300.4.20.1
 * libmlag_pb0 >= 7.4-150300.4.20.1

SUSE Linux Enterprise Module for Server Applications 15 SP5
 * frr >= 8.4-150500.4.11.1
 * frr-devel >= 8.4-150500.4.11.1
 * libfrr0 >= 8.4-150500.4.11.1
 * libfrr_pb0 >= 8.4-150500.4.11.1
 * libfrrcares0 >= 8.4-150500.4.11.1
 * libfrrfpm_pb0 >= 8.4-150500.4.11.1
 * libfrrospfapiclient0 >= 8.4-150500.4.11.1
 * libfrrsnmp0 >= 8.4-150500.4.11.1
 * libfrrzmq0 >= 8.4-150500.4.11.1
 * libmlag_pb0 >= 8.4-150500.4.11.1

SUSE Linux Enterprise Server 15 SP5
 * frr >= 8.4-150500.4.11.1
 * frr-devel >= 8.4-150500.4.11.1
 * libfrr0 >= 8.4-150500.4.11.1
 * libfrr_pb0 >= 8.4-150500.4.11.1
 * libfrrcares0 >= 8.4-150500.4.11.1
 * libfrrfpm_pb0 >= 8.4-150500.4.11.1
 * libfrrospfapiclient0 >= 8.4-150500.4.11.1
 * libfrrsnmp0 >= 8.4-150500.4.11.1
 * libfrrzmq0 >= 8.4-150500.4.11.1
 * libmlag_pb0 >= 8.4-150500.4.11.1

SUSE Linux Enterprise Server for SAP Applications 15 SP5
 * frr >= 8.4-150500.4.11.1
 * frr-devel >= 8.4-150500.4.11.1
 * libfrr0 >= 8.4-150500.4.11.1
 * libfrr_pb0 >= 8.4-150500.4.11.1
 * libfrrcares0 >= 8.4-150500.4.11.1
 * libfrrfpm_pb0 >= 8.4-150500.4.11.1
 * libfrrospfapiclient0 >= 8.4-150500.4.11.1
 * libfrrsnmp0 >= 8.4-150500.4.11.1
 * libfrrzmq0 >= 8.4-150500.4.11.1
 * libmlag_pb0 >= 8.4-150500.4.11.1

SUSE Linux Enterprise High Performance Computing 15 SP5
 * frr >= 8.4-150500.4.11.1
 * frr-devel >= 8.4-150500.4.11.1
 * libfrr0 >= 8.4-150500.4.11.1
 * libfrr_pb0 >= 8.4-150500.4.11.1
 * libfrrcares0 >= 8.4-150500.4.11.1
 * libfrrfpm_pb0 >= 8.4-150500.4.11.1
 * libfrrospfapiclient0 >= 8.4-150500.4.11.1
 * libfrrsnmp0 >= 8.4-150500.4.11.1
 * libfrrzmq0 >= 8.4-150500.4.11.1
 * libmlag_pb0 >= 8.4-150500.4.11.1



--------------------------------------------------------------------------------


STATUS OF THIS ISSUE BY PRODUCT AND PACKAGE

Please note that this evaluation state might be work in progress, incomplete or
outdated. Also information for service packs in the LTSS phase is only included
for issues meeting the LTSS criteria. If in doubt, feel free to contact us for
clarification. The updates are grouped by state of their lifecycle. SUSE product
lifecycles are documented on the lifecycle page.

Product(s) Source package State Products under general support and receiving all
security fixes. SUSE Enterprise Storage 7.1 frr Affected SUSE Enterprise Storage
7.1 quagga Not affected SUSE Linux Enterprise High Performance Computing 12 SP5
quagga Not affected SUSE Linux Enterprise High Performance Computing 15 SP4 frr
In progress SUSE Linux Enterprise High Performance Computing 15 SP4 quagga Not
affected SUSE Linux Enterprise High Performance Computing 15 SP5 frr In progress
SUSE Linux Enterprise High Performance Computing 15 SP5 quagga Not affected SUSE
Linux Enterprise Module for Server Applications 15 SP4 frr In progress SUSE
Linux Enterprise Module for Server Applications 15 SP4 quagga Not affected SUSE
Linux Enterprise Module for Server Applications 15 SP5 frr In progress SUSE
Linux Enterprise Module for Server Applications 15 SP5 quagga Not affected SUSE
Linux Enterprise Real Time 15 SP3 frr Affected SUSE Linux Enterprise Real Time
15 SP3 quagga Not affected SUSE Linux Enterprise Server 12 SP5 quagga Not
affected SUSE Linux Enterprise Server 15 SP4 frr In progress SUSE Linux
Enterprise Server 15 SP4 quagga Not affected SUSE Linux Enterprise Server 15 SP5
frr In progress SUSE Linux Enterprise Server 15 SP5 quagga Not affected SUSE
Linux Enterprise Server for SAP Applications 12 SP5 quagga Not affected SUSE
Linux Enterprise Server for SAP Applications 15 SP4 frr In progress SUSE Linux
Enterprise Server for SAP Applications 15 SP4 quagga Not affected SUSE Linux
Enterprise Server for SAP Applications 15 SP5 frr In progress SUSE Linux
Enterprise Server for SAP Applications 15 SP5 quagga Not affected SUSE Linux
Enterprise Software Development Kit 12 SP5 quagga Not affected SUSE Manager
Proxy 4.3 frr In progress SUSE Manager Proxy 4.3 quagga Not affected SUSE
Manager Retail Branch Server 4.3 frr In progress SUSE Manager Retail Branch
Server 4.3 quagga Not affected SUSE Manager Server 4.3 frr In progress SUSE
Manager Server 4.3 quagga Not affected Products under Long Term Service Pack
support and receiving important and critical security fixes. SUSE Linux
Enterprise High Performance Computing 15 quagga Not affected SUSE Linux
Enterprise High Performance Computing 15 SP1 quagga Not affected SUSE Linux
Enterprise High Performance Computing 15 SP1-ESPOS quagga Not affected SUSE
Linux Enterprise High Performance Computing 15 SP1-LTSS quagga Not affected SUSE
Linux Enterprise High Performance Computing 15 SP2 quagga Not affected SUSE
Linux Enterprise High Performance Computing 15 SP2-ESPOS quagga Not affected
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS quagga Not affected
SUSE Linux Enterprise High Performance Computing 15 SP3 frr Affected SUSE Linux
Enterprise High Performance Computing 15 SP3 quagga Not affected SUSE Linux
Enterprise High Performance Computing 15 SP3-ESPOS frr Affected SUSE Linux
Enterprise High Performance Computing 15 SP3-ESPOS quagga Not affected SUSE
Linux Enterprise High Performance Computing 15 SP3-LTSS frr Affected SUSE Linux
Enterprise High Performance Computing 15 SP3-LTSS quagga Not affected SUSE Linux
Enterprise High Performance Computing 15-ESPOS quagga Not affected SUSE Linux
Enterprise High Performance Computing 15-LTSS quagga Not affected SUSE Linux
Enterprise Module for Server Applications 15 SP1 quagga Not affected SUSE Linux
Enterprise Module for Server Applications 15 SP2 quagga Not affected SUSE Linux
Enterprise Module for Server Applications 15 SP3 frr Affected SUSE Linux
Enterprise Module for Server Applications 15 SP3 quagga Not affected SUSE Linux
Enterprise Server 12 SP2-BCL quagga Not affected SUSE Linux Enterprise Server 15
SP1 quagga Not affected SUSE Linux Enterprise Server 15 SP1-LTSS quagga Not
affected SUSE Linux Enterprise Server 15 SP2 quagga Not affected SUSE Linux
Enterprise Server 15 SP2-LTSS quagga Not affected SUSE Linux Enterprise Server
15 SP3 frr Affected SUSE Linux Enterprise Server 15 SP3 quagga Not affected SUSE
Linux Enterprise Server 15 SP3-LTSS frr Affected SUSE Linux Enterprise Server 15
SP3-LTSS quagga Not affected SUSE Linux Enterprise Server for SAP Applications
15 quagga Not affected SUSE Linux Enterprise Server for SAP Applications 15 SP1
quagga Not affected SUSE Linux Enterprise Server for SAP Applications 15 SP2
quagga Not affected SUSE Linux Enterprise Server for SAP Applications 15 SP3 frr
Affected SUSE Linux Enterprise Server for SAP Applications 15 SP3 quagga Not
affected Products past their end of life and not receiving proactive updates
anymore. HPE Helion OpenStack 8 quagga Not affected SUSE CaaS Platform 4.0
quagga Not affected SUSE Enterprise Storage 6 quagga Not affected SUSE
Enterprise Storage 7 quagga Not affected SUSE Linux Enterprise Desktop 11 SP4
quagga Not affected SUSE Linux Enterprise Desktop 12 SP2 quagga Not affected
SUSE Linux Enterprise Desktop 12 SP3 quagga Not affected SUSE Linux Enterprise
Desktop 12 SP4 quagga Not affected SUSE Linux Enterprise Module for Server
Applications 15 quagga Not affected SUSE Linux Enterprise Real Time 15 SP2
quagga Not affected SUSE Linux Enterprise Server 11 SP3 quagga Not affected SUSE
Linux Enterprise Server 11 SP3-LTSS quagga Not affected SUSE Linux Enterprise
Server 11 SP4 quagga Not affected SUSE Linux Enterprise Server 11 SP4 LTSS
quagga Not affected SUSE Linux Enterprise Server 11 SP4-LTSS quagga Not affected
SUSE Linux Enterprise Server 12 SP2 quagga Not affected SUSE Linux Enterprise
Server 12 SP2-ESPOS quagga Not affected SUSE Linux Enterprise Server 12 SP2-LTSS
quagga Not affected SUSE Linux Enterprise Server 12 SP3 quagga Not affected SUSE
Linux Enterprise Server 12 SP3-BCL quagga Not affected SUSE Linux Enterprise
Server 12 SP3-ESPOS quagga Not affected SUSE Linux Enterprise Server 12 SP3-LTSS
quagga Not affected SUSE Linux Enterprise Server 12 SP4 quagga Not affected SUSE
Linux Enterprise Server 12 SP4-ESPOS quagga Not affected SUSE Linux Enterprise
Server 12 SP4-LTSS quagga Not affected SUSE Linux Enterprise Server 15 quagga
Not affected SUSE Linux Enterprise Server 15 SP1-BCL quagga Not affected SUSE
Linux Enterprise Server 15 SP2-BCL quagga Not affected SUSE Linux Enterprise
Server 15 SP3-BCL frr Affected SUSE Linux Enterprise Server 15 SP3-BCL quagga
Not affected SUSE Linux Enterprise Server 15-LTSS quagga Not affected SUSE Linux
Enterprise Server for Raspberry Pi 12 SP2 quagga Not affected SUSE Linux
Enterprise Server for SAP Applications 11 SP4 quagga Not affected SUSE Linux
Enterprise Server for SAP Applications 12 SP2 quagga Not affected SUSE Linux
Enterprise Server for SAP Applications 12 SP3 quagga Not affected SUSE Linux
Enterprise Server for SAP Applications 12 SP4 quagga Not affected SUSE Linux
Enterprise Software Development Kit 11 SP4 quagga Not affected SUSE Linux
Enterprise Software Development Kit 12 SP2 quagga Not affected SUSE Linux
Enterprise Software Development Kit 12 SP3 quagga Not affected SUSE Linux
Enterprise Software Development Kit 12 SP4 quagga Not affected SUSE Manager
Proxy 4.0 quagga Not affected SUSE Manager Proxy 4.1 quagga Not affected SUSE
Manager Proxy 4.2 frr Affected SUSE Manager Proxy 4.2 quagga Not affected SUSE
Manager Retail Branch Server 4.0 quagga Not affected SUSE Manager Retail Branch
Server 4.1 quagga Not affected SUSE Manager Retail Branch Server 4.2 frr
Affected SUSE Manager Retail Branch Server 4.2 quagga Not affected SUSE Manager
Server 4.0 quagga Not affected SUSE Manager Server 4.1 quagga Not affected SUSE
Manager Server 4.2 frr Affected SUSE Manager Server 4.2 quagga Not affected SUSE
OpenStack Cloud 7 quagga Not affected SUSE OpenStack Cloud 8 quagga Not affected
SUSE OpenStack Cloud 9 quagga Not affected SUSE OpenStack Cloud Crowbar 8 quagga
Not affected SUSE OpenStack Cloud Crowbar 9 quagga Not affected



--------------------------------------------------------------------------------


SUSE TIMELINE FOR THIS CVE

CVE page created: Thu Oct 26 08:00:09 2023
CVE page last modified: Thu Nov 2 15:33:30 2023



LANGUAGE

Choose Your Language

Deutsch English Español Français 中文(简体) 日本語 Português (Brasil)

EXPLORE

See what's happening around the world

Polska 대한민국

HI

Update Your Account Log Out
Login Create an Account Update Your Account
 * Careers
 * Legal
 * Anti-Slavery Statement
 * Anti-slavery
 * About
 * Communications Preferences
 * Contact Us
 * Let's Chat

 * 
 * 
 * 


Support: Open a Support Case
© 2023 SUSE, All Rights Reserved Cookie Settings Privacy and Cookie Policy


×

Give Us Feedback

Got some feedback about the website? Let us know so we can fix it.





For support information, please visit Support.

Sales:
1-800-796-3700
Support:
Open a Support Case

CONNECT WITH US



Feedback Form

We adapt, you succeed.


Read Privacy Policy
Required Fields*
×




PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

FLAGGED

Flagged

Recategorised cookies as of 17 June 2020


BACK BUTTON BACK



Vendor Search Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices



HOW WE USE COOKIES

We use cookies to give you a better experience, improve performance and analyze
traffic. Please visit our privacy policy for more information.

Accept Only Technical Cookies Accept All Cookies
View and Change Cookie Preferences