Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-2266 (GCVE-0-2013-2266)
Vulnerability from cvelistv5 – Published: 2013-03-28 16:00 – Updated: 2024-08-06 15:27- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:27:41.144Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.isc.org/article/AA-00871/"
},
{
"name": "FEDORA-2013-4533",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1244"
},
{
"name": "RHSA-2013:0689",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.isc.org/article/AA-00879/"
},
{
"name": "FEDORA-2013-4525",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
},
{
"name": "HPSBUX02876",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"name": "SSRT101148",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"name": "58736",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/58736"
},
{
"name": "RHSA-2013:0690",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
},
{
"name": "APPLE-SA-2013-09-12-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name": "oval:org.mitre.oval:def:19579",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
},
{
"name": "DSA-2656",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2013/dsa-2656"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5880"
},
{
"name": "USN-1783-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1783-1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-03-26T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.isc.org/article/AA-00871/"
},
{
"name": "FEDORA-2013-4533",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1244"
},
{
"name": "RHSA-2013:0689",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.isc.org/article/AA-00879/"
},
{
"name": "FEDORA-2013-4525",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
},
{
"name": "HPSBUX02876",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"name": "SSRT101148",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"name": "58736",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/58736"
},
{
"name": "RHSA-2013:0690",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
},
{
"name": "APPLE-SA-2013-09-12-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name": "oval:org.mitre.oval:def:19579",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
},
{
"name": "DSA-2656",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2013/dsa-2656"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5880"
},
{
"name": "USN-1783-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1783-1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-2266",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.isc.org/article/AA-00871/",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/article/AA-00871/"
},
{
"name": "FEDORA-2013-4533",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1244",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-1244"
},
{
"name": "RHSA-2013:0689",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
},
{
"name": "http://www.isc.org/software/bind/advisories/cve-2013-2266",
"refsource": "CONFIRM",
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
},
{
"name": "https://kb.isc.org/article/AA-00879/",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/article/AA-00879/"
},
{
"name": "FEDORA-2013-4525",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
},
{
"name": "HPSBUX02876",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"name": "SSRT101148",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"name": "58736",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58736"
},
{
"name": "RHSA-2013:0690",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
},
{
"name": "APPLE-SA-2013-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name": "oval:org.mitre.oval:def:19579",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
},
{
"name": "DSA-2656",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2656"
},
{
"name": "http://support.apple.com/kb/HT5880",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5880"
},
{
"name": "USN-1783-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1783-1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-2266",
"datePublished": "2013-03-28T16:00:00.000Z",
"dateReserved": "2013-02-21T00:00:00.000Z",
"dateUpdated": "2024-08-06T15:27:41.144Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2013-2266",
"date": "2026-05-19",
"epss": "0.44844",
"percentile": "0.97626"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2B96B87-F18C-41EF-9A37-7D0842433A4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFA1AA14-4D4A-45D0-9573-D53C0FFFFF78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5DE1274-F7A1-4F12-A4F5-1CB1DD5B84E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*\", \"matchCriteriaId\": \"401A7E61-AC3D-417D-97B8-E5E736DC6FCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7C37F7D-DD28-4C70-A534-A3F434DF4273\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2EC1F99-85C1-4081-A118-790111741246\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"85D6C9B7-9D5D-4589-AC83-E6ECB535EBFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"043A5E3F-529B-4A9A-8531-184EE6D1942D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"673057D5-256C-4933-B56F-4BF8848323F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2CE371B-E399-4D74-B46C-3606E4BDA53A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A3798A1-134C-4066-A012-10C15F103EAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CA1AEBE-040C-483A-9850-7DA888FF8075\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9A33F04-3240-4268-B613-C4876770A30F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91DA33F1-CA29-4EB1-8F95-8CEA71383BF4\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A7BE793-7717-4019-8F50-158C309E48B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BE322FB-CC6F-46BA-861C-74C16D7FC791\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B178BB5-A0DC-4014-A8CC-D89B0E2F9789\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BE753CB-A16D-4605-8640-137CD4A2BB16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B5F1155-78D6-480B-BC0A-1D36B08D2594\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A11247D0-A33E-4CE5-910A-F38B89C63EC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9478F4E-451D-4B4E-8054-E09522F97C59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"87393BF8-9FE3-4501-94CA-A1AA9E38E771\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FC642B5-ACA4-4764-A9F2-3C87D5D8E9E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A16CE093-38E0-4274-AD53-B807DE72AF91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FB97DEB-A0A4-458C-A94B-46B7264AB0F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFDF6597-7131-4080-BCFC-46032138646C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"881B8C5B-8A66-45AC-85E6-758B8A8153BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E2D144E-6A15-4B45-8B15-15B60FB33D71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5690EC8-66C9-4316-BEAB-C218843F7FCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBF13572-C341-4FB1-BAFD-AF8F0C5EF510\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B1D9F9C-54C2-485F-9B66-4AEA0573BC2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"423211E8-A08B-4254-977A-1917AED9B794\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ABE2712-33E9-45EE-890C-E9FC51D19B75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD79961B-508F-4A20-AD4D-D766DFB928E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E5510BF-3D22-49DA-A4C6-2D6204EB37C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD1BC4C7-F72B-43DB-B729-018360F4B281\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB36BD1D-A6AB-4BC8-94C0-FA662622FF26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFF83126-E2C8-4156-9C28-7E3005A74E17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"97D011B3-D9F3-4BC2-9695-A842148EA6BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BC43BF9-5C34-4DF1-846A-E416DE9C7DA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADD24439-71B4-41AC-85D4-56511445051C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B063AE57-D426-4565-B2D9-ACDB0C16C78E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCEA5F9A-A308-4573-BBEB-6B210A61D943\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D13D4E84-04EB-4843-A1C4-E3265D1DAC00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"434AA05B-1A22-474B-BEA3-CACAD78955F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E434E995-F554-45A7-A907-EE2725727B82\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EBDD71E-6F17-4EB6-899F-E27A93CDFDF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*\", \"matchCriteriaId\": \"811D03B2-96A8-47F9-80BE-54228A4108EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3D4393C-1151-49F9-963B-B6FD88E93814\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"25855A5C-302F-4A82-AEC1-8C4C9CB70362\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"03E68ACA-0288-4EE5-9250-54711B2E6670\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D717D3D-F4BF-470B-AC2B-D1234A7303EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"66D259B7-4F9E-43B2-BB1D-3B097D3CDB28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F9DA20E-57EA-49A0-9DB2-E9E0191EC1AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCC604FD-A834-4BA7-B1E2-1FCB6A583204\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*\", \"matchCriteriaId\": \"479D3C6C-1FD7-4DBE-A841-4B58400A89F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAF29160-63C2-40D0-BE08-3C8181CD5092\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DAA3942-0979-4D33-BD52-EF7F0403DFBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"39D75F93-B6A7-4D25-8147-25F7F867E5B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B046CE1D-03E1-462F-9762-9269E59BD554\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAC9049D-6284-40F7-9E97-596FEDF9EEDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"10D06B47-911B-4095-ABD2-DDD38E6306F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59428551-218B-4C32-982F-DCDC894E2954\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"961E22DC-1467-4A0C-9450-A2E047FCFCFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF77CAF5-A8D6-4479-9C4D-A698D26BDC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD318FF1-320B-4311-AF7E-988C023B4938\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDCC8861-0655-4180-A083-1516AC441A3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB2E6ABE-B1CB-4603-AFC8-BB7BE1AD96B5\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.\"}, {\"lang\": \"es\", \"value\": \"libdns en ISC BIND v9.7.x y v9.8.x antes v9.8.4-P2, v9.8.5 antes de v9.8.5b2, v9.9.x antes de v9.9.2-P2, y v9.9.3 antes v9.9.3b2 en plataformas UNIX permite a atacantes remotos para causar una denegaci\\u00f3n de servicio (consumo de memoria) a trav\\u00e9s de una expresi\\u00f3n regular manipulada, como lo demuestra un ataque memoria de agotamiento contra un equipo que ejecuta un proceso llamado.\"}]",
"id": "CVE-2013-2266",
"lastModified": "2024-11-21T01:51:21.653",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2013-03-28T16:55:01.040",
"references": "[{\"url\": \"http://linux.oracle.com/errata/ELSA-2014-1244\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0689.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0690.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.apple.com/kb/HT5880\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2656\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.isc.org/software/bind/advisories/cve-2013-2266\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/58736\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1783-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kb.isc.org/article/AA-00871/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kb.isc.org/article/AA-00879/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://linux.oracle.com/errata/ELSA-2014-1244\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0689.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0690.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT5880\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2656\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.isc.org/software/bind/advisories/cve-2013-2266\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/58736\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1783-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kb.isc.org/article/AA-00871/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kb.isc.org/article/AA-00879/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-2266\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-03-28T16:55:01.040\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.\"},{\"lang\":\"es\",\"value\":\"libdns en ISC BIND v9.7.x y v9.8.x antes v9.8.4-P2, v9.8.5 antes de v9.8.5b2, v9.9.x antes de v9.9.2-P2, y v9.9.3 antes v9.9.3b2 en plataformas UNIX permite a atacantes remotos para causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de una expresi\u00f3n regular manipulada, como lo demuestra un ataque memoria de agotamiento contra un equipo que ejecuta un proceso llamado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2B96B87-F18C-41EF-9A37-7D0842433A4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFA1AA14-4D4A-45D0-9573-D53C0FFFFF78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5DE1274-F7A1-4F12-A4F5-1CB1DD5B84E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*\",\"matchCriteriaId\":\"401A7E61-AC3D-417D-97B8-E5E736DC6FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C37F7D-DD28-4C70-A534-A3F434DF4273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2EC1F99-85C1-4081-A118-790111741246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D6C9B7-9D5D-4589-AC83-E6ECB535EBFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"043A5E3F-529B-4A9A-8531-184EE6D1942D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"673057D5-256C-4933-B56F-4BF8848323F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CE371B-E399-4D74-B46C-3606E4BDA53A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A3798A1-134C-4066-A012-10C15F103EAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA1AEBE-040C-483A-9850-7DA888FF8075\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9A33F04-3240-4268-B613-C4876770A30F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91DA33F1-CA29-4EB1-8F95-8CEA71383BF4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7BE793-7717-4019-8F50-158C309E48B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BE322FB-CC6F-46BA-861C-74C16D7FC791\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B178BB5-A0DC-4014-A8CC-D89B0E2F9789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE753CB-A16D-4605-8640-137CD4A2BB16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B5F1155-78D6-480B-BC0A-1D36B08D2594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A11247D0-A33E-4CE5-910A-F38B89C63EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9478F4E-451D-4B4E-8054-E09522F97C59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"87393BF8-9FE3-4501-94CA-A1AA9E38E771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC642B5-ACA4-4764-A9F2-3C87D5D8E9E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A16CE093-38E0-4274-AD53-B807DE72AF91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FB97DEB-A0A4-458C-A94B-46B7264AB0F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFDF6597-7131-4080-BCFC-46032138646C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"881B8C5B-8A66-45AC-85E6-758B8A8153BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2D144E-6A15-4B45-8B15-15B60FB33D71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5690EC8-66C9-4316-BEAB-C218843F7FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF13572-C341-4FB1-BAFD-AF8F0C5EF510\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1D9F9C-54C2-485F-9B66-4AEA0573BC2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"423211E8-A08B-4254-977A-1917AED9B794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABE2712-33E9-45EE-890C-E9FC51D19B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD79961B-508F-4A20-AD4D-D766DFB928E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5510BF-3D22-49DA-A4C6-2D6204EB37C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD1BC4C7-F72B-43DB-B729-018360F4B281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB36BD1D-A6AB-4BC8-94C0-FA662622FF26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF83126-E2C8-4156-9C28-7E3005A74E17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D011B3-D9F3-4BC2-9695-A842148EA6BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC43BF9-5C34-4DF1-846A-E416DE9C7DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADD24439-71B4-41AC-85D4-56511445051C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B063AE57-D426-4565-B2D9-ACDB0C16C78E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCEA5F9A-A308-4573-BBEB-6B210A61D943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13D4E84-04EB-4843-A1C4-E3265D1DAC00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"434AA05B-1A22-474B-BEA3-CACAD78955F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E434E995-F554-45A7-A907-EE2725727B82\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EBDD71E-6F17-4EB6-899F-E27A93CDFDF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"811D03B2-96A8-47F9-80BE-54228A4108EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D4393C-1151-49F9-963B-B6FD88E93814\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25855A5C-302F-4A82-AEC1-8C4C9CB70362\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E68ACA-0288-4EE5-9250-54711B2E6670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D717D3D-F4BF-470B-AC2B-D1234A7303EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"66D259B7-4F9E-43B2-BB1D-3B097D3CDB28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F9DA20E-57EA-49A0-9DB2-E9E0191EC1AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC604FD-A834-4BA7-B1E2-1FCB6A583204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"479D3C6C-1FD7-4DBE-A841-4B58400A89F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF29160-63C2-40D0-BE08-3C8181CD5092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DAA3942-0979-4D33-BD52-EF7F0403DFBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"39D75F93-B6A7-4D25-8147-25F7F867E5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B046CE1D-03E1-462F-9762-9269E59BD554\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAC9049D-6284-40F7-9E97-596FEDF9EEDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D06B47-911B-4095-ABD2-DDD38E6306F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59428551-218B-4C32-982F-DCDC894E2954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"961E22DC-1467-4A0C-9450-A2E047FCFCFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF77CAF5-A8D6-4479-9C4D-A698D26BDC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD318FF1-320B-4311-AF7E-988C023B4938\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDCC8861-0655-4180-A083-1516AC441A3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2E6ABE-B1CB-4603-AFC8-BB7BE1AD96B5\"}]}]}],\"references\":[{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1244\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0689.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0690.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT5880\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2656\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.isc.org/software/bind/advisories/cve-2013-2266\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/58736\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1783-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.isc.org/article/AA-00871/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.isc.org/article/AA-00879/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1244\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0689.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0690.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5880\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2656\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.isc.org/software/bind/advisories/cve-2013-2266\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/58736\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1783-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.isc.org/article/AA-00871/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.isc.org/article/AA-00879/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2013-AVI-210
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été corrigée dans ISC BIND. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ISC BIND de la version 9.9.0 \u00e0 la version 9.9.3b1 pour Unix",
"product": {
"name": "BIND",
"vendor": {
"name": "ISC",
"scada": false
}
}
},
{
"description": "ISC BIND branche 9.7.x pour Unix",
"product": {
"name": "BIND",
"vendor": {
"name": "ISC",
"scada": false
}
}
},
{
"description": "ISC BIND de la version 9.8.0 \u00e0 la version 9.8.5b1 pour Unix",
"product": {
"name": "BIND",
"vendor": {
"name": "ISC",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-2266",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2266"
}
],
"links": [],
"reference": "CERTA-2013-AVI-210",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eISC\nBIND\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans ISC BIND",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ISC AA-00871 du 26 mars 2013",
"url": "https://kb.isc.org/article/AA-00871"
}
]
}
CERTA-2013-AVI-285
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été corrigée dans F5 Bind. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| F5 | N/A | BIG-IP PSM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP LTM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | Enterprise Manager versions 3.0.0 à 3.1.0 | ||
| F5 | N/A | BIG-IP Analytics versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP WebAccelerator versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP PEM version 11.3.0 | ||
| F5 | N/A | BIG-IP ASM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP Edge Gateway versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP APM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP AFM version 11.3.0 | ||
| F5 | N/A | BIG-IP GTM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP WOM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP Link Controller versions 11.0.0 à 11.3.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "BIG-IP PSM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP LTM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "Enterprise Manager versions 3.0.0 \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP Analytics versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP WebAccelerator versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP PEM version 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP ASM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP Edge Gateway versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP APM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP AFM version 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP GTM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP WOM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP Link Controller versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-2266",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2266"
}
],
"links": [],
"reference": "CERTA-2013-AVI-285",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-05-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eF5\nBind\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans F5 Bind",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 sol14386 du 01 mai 2013",
"url": "http://support.f5.com/kb/en-us/solutions/public/14000/300/sol14386.html?sr=29159689"
}
]
}
CERTA-2013-AVI-529
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Apple OS X Mountain Lion. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple OS X Mountain Lion versions antérieures à 10.8.5
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eApple OS X Mountain Lion versions ant\u00e9rieures \u00e0 10.8.5\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-5166",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5166"
},
{
"name": "CVE-2013-1027",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1027"
},
{
"name": "CVE-2012-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4244"
},
{
"name": "CVE-2013-1635",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1635"
},
{
"name": "CVE-2013-1029",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1029"
},
{
"name": "CVE-2013-1899",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1899"
},
{
"name": "CVE-2013-1901",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1901"
},
{
"name": "CVE-2013-1032",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1032"
},
{
"name": "CVE-2012-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2687"
},
{
"name": "CVE-2013-1643",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1643"
},
{
"name": "CVE-2013-1031",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1031"
},
{
"name": "CVE-2012-5688",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5688"
},
{
"name": "CVE-2013-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0166"
},
{
"name": "CVE-2013-1033",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1033"
},
{
"name": "CVE-2012-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2686"
},
{
"name": "CVE-2012-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3817"
},
{
"name": "CVE-2013-2021",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2021"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"name": "CVE-2013-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1025"
},
{
"name": "CVE-2013-1028",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1028"
},
{
"name": "CVE-2013-1903",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1903"
},
{
"name": "CVE-2013-2020",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2020"
},
{
"name": "CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"name": "CVE-2013-1900",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1900"
},
{
"name": "CVE-2013-1824",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1824"
},
{
"name": "CVE-2013-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2110"
},
{
"name": "CVE-2013-2266",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2266"
},
{
"name": "CVE-2013-1026",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1026"
},
{
"name": "CVE-2013-1902",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1902"
},
{
"name": "CVE-2012-0883",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0883"
},
{
"name": "CVE-2013-1030",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1030"
}
],
"links": [],
"reference": "CERTA-2013-AVI-529",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-09-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X Mountain Lion\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X Mountain Lion",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 12 septembre 2013",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
}
]
}
CERTA-2013-AVI-210
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été corrigée dans ISC BIND. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ISC BIND de la version 9.9.0 \u00e0 la version 9.9.3b1 pour Unix",
"product": {
"name": "BIND",
"vendor": {
"name": "ISC",
"scada": false
}
}
},
{
"description": "ISC BIND branche 9.7.x pour Unix",
"product": {
"name": "BIND",
"vendor": {
"name": "ISC",
"scada": false
}
}
},
{
"description": "ISC BIND de la version 9.8.0 \u00e0 la version 9.8.5b1 pour Unix",
"product": {
"name": "BIND",
"vendor": {
"name": "ISC",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-2266",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2266"
}
],
"links": [],
"reference": "CERTA-2013-AVI-210",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eISC\nBIND\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans ISC BIND",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ISC AA-00871 du 26 mars 2013",
"url": "https://kb.isc.org/article/AA-00871"
}
]
}
CERTA-2013-AVI-285
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été corrigée dans F5 Bind. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| F5 | N/A | BIG-IP PSM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP LTM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | Enterprise Manager versions 3.0.0 à 3.1.0 | ||
| F5 | N/A | BIG-IP Analytics versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP WebAccelerator versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP PEM version 11.3.0 | ||
| F5 | N/A | BIG-IP ASM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP Edge Gateway versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP APM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP AFM version 11.3.0 | ||
| F5 | N/A | BIG-IP GTM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP WOM versions 11.0.0 à 11.3.0 | ||
| F5 | N/A | BIG-IP Link Controller versions 11.0.0 à 11.3.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "BIG-IP PSM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP LTM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "Enterprise Manager versions 3.0.0 \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP Analytics versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP WebAccelerator versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP PEM version 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP ASM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP Edge Gateway versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP APM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP AFM version 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP GTM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP WOM versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP Link Controller versions 11.0.0 \u00e0 11.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-2266",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2266"
}
],
"links": [],
"reference": "CERTA-2013-AVI-285",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-05-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eF5\nBind\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans F5 Bind",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 sol14386 du 01 mai 2013",
"url": "http://support.f5.com/kb/en-us/solutions/public/14000/300/sol14386.html?sr=29159689"
}
]
}
CERTA-2013-AVI-529
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Apple OS X Mountain Lion. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple OS X Mountain Lion versions antérieures à 10.8.5
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eApple OS X Mountain Lion versions ant\u00e9rieures \u00e0 10.8.5\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-5166",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5166"
},
{
"name": "CVE-2013-1027",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1027"
},
{
"name": "CVE-2012-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4244"
},
{
"name": "CVE-2013-1635",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1635"
},
{
"name": "CVE-2013-1029",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1029"
},
{
"name": "CVE-2013-1899",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1899"
},
{
"name": "CVE-2013-1901",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1901"
},
{
"name": "CVE-2013-1032",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1032"
},
{
"name": "CVE-2012-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2687"
},
{
"name": "CVE-2013-1643",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1643"
},
{
"name": "CVE-2013-1031",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1031"
},
{
"name": "CVE-2012-5688",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5688"
},
{
"name": "CVE-2013-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0166"
},
{
"name": "CVE-2013-1033",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1033"
},
{
"name": "CVE-2012-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2686"
},
{
"name": "CVE-2012-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3817"
},
{
"name": "CVE-2013-2021",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2021"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"name": "CVE-2013-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1025"
},
{
"name": "CVE-2013-1028",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1028"
},
{
"name": "CVE-2013-1903",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1903"
},
{
"name": "CVE-2013-2020",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2020"
},
{
"name": "CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"name": "CVE-2013-1900",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1900"
},
{
"name": "CVE-2013-1824",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1824"
},
{
"name": "CVE-2013-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2110"
},
{
"name": "CVE-2013-2266",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2266"
},
{
"name": "CVE-2013-1026",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1026"
},
{
"name": "CVE-2013-1902",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1902"
},
{
"name": "CVE-2012-0883",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0883"
},
{
"name": "CVE-2013-1030",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1030"
}
],
"links": [],
"reference": "CERTA-2013-AVI-529",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-09-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X Mountain Lion\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X Mountain Lion",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 12 septembre 2013",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
}
]
}
FKIE_CVE-2013-2266
Vulnerability from fkie_nvd - Published: 2013-03-28 16:55 - Updated: 2026-04-29 01:13| Vendor | Product | Version | |
|---|---|---|---|
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.0 | |
| isc | bind | 9.9.1 | |
| isc | bind | 9.9.1 | |
| isc | bind | 9.9.1 | |
| isc | bind | 9.9.2 | |
| isc | bind | 9.9.3 | |
| isc | bind | 9.9.3 | |
| isc | bind | 9.7.0 | |
| isc | bind | 9.7.0 | |
| isc | bind | 9.7.0 | |
| isc | bind | 9.7.0 | |
| isc | bind | 9.7.0 | |
| isc | bind | 9.7.0 | |
| isc | bind | 9.7.1 | |
| isc | bind | 9.7.1 | |
| isc | bind | 9.7.1 | |
| isc | bind | 9.7.1 | |
| isc | bind | 9.7.2 | |
| isc | bind | 9.7.2 | |
| isc | bind | 9.7.2 | |
| isc | bind | 9.7.2 | |
| isc | bind | 9.7.2 | |
| isc | bind | 9.7.3 | |
| isc | bind | 9.7.3 | |
| isc | bind | 9.7.3 | |
| isc | bind | 9.7.3 | |
| isc | bind | 9.7.4 | |
| isc | bind | 9.7.4 | |
| isc | bind | 9.7.4 | |
| isc | bind | 9.7.4 | |
| isc | bind | 9.7.5 | |
| isc | bind | 9.7.5 | |
| isc | bind | 9.7.5 | |
| isc | bind | 9.7.5 | |
| isc | bind | 9.7.6 | |
| isc | bind | 9.7.6 | |
| isc | bind | 9.7.6 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.0 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.1 | |
| isc | bind | 9.8.2 | |
| isc | bind | 9.8.2 | |
| isc | bind | 9.8.2 | |
| isc | bind | 9.8.3 | |
| isc | bind | 9.8.3 | |
| isc | bind | 9.8.3 | |
| isc | bind | 9.8.4 | |
| isc | bind | 9.8.5 | |
| isc | bind | 9.8.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B96B87-F18C-41EF-9A37-7D0842433A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "AFA1AA14-4D4A-45D0-9573-D53C0FFFFF78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*",
"matchCriteriaId": "F5DE1274-F7A1-4F12-A4F5-1CB1DD5B84E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*",
"matchCriteriaId": "401A7E61-AC3D-417D-97B8-E5E736DC6FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "C7C37F7D-DD28-4C70-A534-A3F434DF4273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "B2EC1F99-85C1-4081-A118-790111741246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "85D6C9B7-9D5D-4589-AC83-E6ECB535EBFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "043A5E3F-529B-4A9A-8531-184EE6D1942D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "673057D5-256C-4933-B56F-4BF8848323F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C2CE371B-E399-4D74-B46C-3606E4BDA53A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A3798A1-134C-4066-A012-10C15F103EAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "9CA1AEBE-040C-483A-9850-7DA888FF8075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "B9A33F04-3240-4268-B613-C4876770A30F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "91DA33F1-CA29-4EB1-8F95-8CEA71383BF4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7BE793-7717-4019-8F50-158C309E48B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*",
"matchCriteriaId": "9BE322FB-CC6F-46BA-861C-74C16D7FC791",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B178BB5-A0DC-4014-A8CC-D89B0E2F9789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "1BE753CB-A16D-4605-8640-137CD4A2BB16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "5B5F1155-78D6-480B-BC0A-1D36B08D2594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "A11247D0-A33E-4CE5-910A-F38B89C63EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E9478F4E-451D-4B4E-8054-E09522F97C59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "87393BF8-9FE3-4501-94CA-A1AA9E38E771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC642B5-ACA4-4764-A9F2-3C87D5D8E9E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "A16CE093-38E0-4274-AD53-B807DE72AF91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "2FB97DEB-A0A4-458C-A94B-46B7264AB0F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BFDF6597-7131-4080-BCFC-46032138646C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "881B8C5B-8A66-45AC-85E6-758B8A8153BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*",
"matchCriteriaId": "4E2D144E-6A15-4B45-8B15-15B60FB33D71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*",
"matchCriteriaId": "B5690EC8-66C9-4316-BEAB-C218843F7FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*",
"matchCriteriaId": "FBF13572-C341-4FB1-BAFD-AF8F0C5EF510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0B1D9F9C-54C2-485F-9B66-4AEA0573BC2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "423211E8-A08B-4254-977A-1917AED9B794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*",
"matchCriteriaId": "3ABE2712-33E9-45EE-890C-E9FC51D19B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "BD79961B-508F-4A20-AD4D-D766DFB928E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5E5510BF-3D22-49DA-A4C6-2D6204EB37C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1BC4C7-F72B-43DB-B729-018360F4B281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*",
"matchCriteriaId": "DB36BD1D-A6AB-4BC8-94C0-FA662622FF26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "DFF83126-E2C8-4156-9C28-7E3005A74E17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "97D011B3-D9F3-4BC2-9695-A842148EA6BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC43BF9-5C34-4DF1-846A-E416DE9C7DA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*",
"matchCriteriaId": "ADD24439-71B4-41AC-85D4-56511445051C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B063AE57-D426-4565-B2D9-ACDB0C16C78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*",
"matchCriteriaId": "CCEA5F9A-A308-4573-BBEB-6B210A61D943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D13D4E84-04EB-4843-A1C4-E3265D1DAC00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*",
"matchCriteriaId": "434AA05B-1A22-474B-BEA3-CACAD78955F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*",
"matchCriteriaId": "E434E995-F554-45A7-A907-EE2725727B82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4EBDD71E-6F17-4EB6-899F-E27A93CDFDF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "811D03B2-96A8-47F9-80BE-54228A4108EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "B3D4393C-1151-49F9-963B-B6FD88E93814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "25855A5C-302F-4A82-AEC1-8C4C9CB70362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "03E68ACA-0288-4EE5-9250-54711B2E6670",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8D717D3D-F4BF-470B-AC2B-D1234A7303EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "66D259B7-4F9E-43B2-BB1D-3B097D3CDB28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F9DA20E-57EA-49A0-9DB2-E9E0191EC1AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*",
"matchCriteriaId": "FCC604FD-A834-4BA7-B1E2-1FCB6A583204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*",
"matchCriteriaId": "479D3C6C-1FD7-4DBE-A841-4B58400A89F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*",
"matchCriteriaId": "BAF29160-63C2-40D0-BE08-3C8181CD5092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "8DAA3942-0979-4D33-BD52-EF7F0403DFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "39D75F93-B6A7-4D25-8147-25F7F867E5B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*",
"matchCriteriaId": "B046CE1D-03E1-462F-9762-9269E59BD554",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "DAC9049D-6284-40F7-9E97-596FEDF9EEDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "10D06B47-911B-4095-ABD2-DDD38E6306F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "59428551-218B-4C32-982F-DCDC894E2954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "961E22DC-1467-4A0C-9450-A2E047FCFCFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "DF77CAF5-A8D6-4479-9C4D-A698D26BDC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AD318FF1-320B-4311-AF7E-988C023B4938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BDCC8861-0655-4180-A083-1516AC441A3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*",
"matchCriteriaId": "DB2E6ABE-B1CB-4603-AFC8-BB7BE1AD96B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process."
},
{
"lang": "es",
"value": "libdns en ISC BIND v9.7.x y v9.8.x antes v9.8.4-P2, v9.8.5 antes de v9.8.5b2, v9.9.x antes de v9.9.2-P2, y v9.9.3 antes v9.9.3b2 en plataformas UNIX permite a atacantes remotos para causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de una expresi\u00f3n regular manipulada, como lo demuestra un ataque memoria de agotamiento contra un equipo que ejecuta un proceso llamado."
}
],
"id": "CVE-2013-2266",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-03-28T16:55:01.040",
"references": [
{
"source": "cve@mitre.org",
"url": "http://linux.oracle.com/errata/ELSA-2014-1244"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT5880"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2013/dsa-2656"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/58736"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-1783-1"
},
{
"source": "cve@mitre.org",
"url": "https://kb.isc.org/article/AA-00871/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-00879/"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://linux.oracle.com/errata/ELSA-2014-1244"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5880"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2013/dsa-2656"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/58736"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1783-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://kb.isc.org/article/AA-00871/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-00879/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-42V2-796F-QQMV
Vulnerability from github – Published: 2022-05-14 02:13 – Updated: 2025-04-11 04:08libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
{
"affected": [],
"aliases": [
"CVE-2013-2266"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-03-28T16:55:00Z",
"severity": "HIGH"
},
"details": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.",
"id": "GHSA-42v2-796f-qqmv",
"modified": "2025-04-11T04:08:51Z",
"published": "2022-05-14T02:13:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2266"
},
{
"type": "WEB",
"url": "https://kb.isc.org/article/AA-00871"
},
{
"type": "WEB",
"url": "https://kb.isc.org/article/AA-00879"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
},
{
"type": "WEB",
"url": "http://linux.oracle.com/errata/ELSA-2014-1244"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5880"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2013/dsa-2656"
},
{
"type": "WEB",
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/58736"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1783-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2013-2266
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-2266",
"description": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.",
"id": "GSD-2013-2266",
"references": [
"https://www.suse.com/security/cve/CVE-2013-2266.html",
"https://www.debian.org/security/2013/dsa-2656",
"https://access.redhat.com/errata/RHSA-2013:0690",
"https://access.redhat.com/errata/RHSA-2013:0689",
"https://alas.aws.amazon.com/cve/html/CVE-2013-2266.html",
"https://linux.oracle.com/cve/CVE-2013-2266.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-2266"
],
"details": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.",
"id": "GSD-2013-2266",
"modified": "2023-12-13T01:22:18.010494Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-2266",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.isc.org/article/AA-00871/",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/article/AA-00871/"
},
{
"name": "FEDORA-2013-4533",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1244",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-1244"
},
{
"name": "RHSA-2013:0689",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
},
{
"name": "http://www.isc.org/software/bind/advisories/cve-2013-2266",
"refsource": "CONFIRM",
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
},
{
"name": "https://kb.isc.org/article/AA-00879/",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/article/AA-00879/"
},
{
"name": "FEDORA-2013-4525",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
},
{
"name": "HPSBUX02876",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"name": "SSRT101148",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"name": "58736",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58736"
},
{
"name": "RHSA-2013:0690",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
},
{
"name": "APPLE-SA-2013-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name": "oval:org.mitre.oval:def:19579",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
},
{
"name": "DSA-2656",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2656"
},
{
"name": "http://support.apple.com/kb/HT5880",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5880"
},
{
"name": "USN-1783-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1783-1"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-2266"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.isc.org/software/bind/advisories/cve-2013-2266",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
},
{
"name": "https://kb.isc.org/article/AA-00879/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-00879/"
},
{
"name": "https://kb.isc.org/article/AA-00871/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://kb.isc.org/article/AA-00871/"
},
{
"name": "RHSA-2013:0690",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
},
{
"name": "USN-1783-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-1783-1"
},
{
"name": "RHSA-2013:0689",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
},
{
"name": "DSA-2656",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2013/dsa-2656"
},
{
"name": "SSRT101148",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
},
{
"name": "APPLE-SA-2013-09-12-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name": "http://support.apple.com/kb/HT5880",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5880"
},
{
"name": "FEDORA-2013-4533",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
},
{
"name": "FEDORA-2013-4525",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
},
{
"name": "58736",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/58736"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1244",
"refsource": "CONFIRM",
"tags": [],
"url": "http://linux.oracle.com/errata/ELSA-2014-1244"
},
{
"name": "oval:org.mitre.oval:def:19579",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-30T16:27Z",
"publishedDate": "2013-03-28T16:55Z"
}
}
}
OPENSUSE-SU-2024:10358-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "dhcp-4.3.3.P1-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the dhcp-4.3.3.P1-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10358",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10358-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1892 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1892/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2156 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3611 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3616 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0413 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0997 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-2748 page",
"url": "https://www.suse.com/security/cve/CVE-2011-2748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-2749 page",
"url": "https://www.suse.com/security/cve/CVE-2011-2749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4539 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4868 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3570 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3571 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3954 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3955 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2266 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8605 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8605/"
}
],
"title": "dhcp-4.3.3.P1-3.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10358-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-client-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-devel-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-doc-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-relay-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-server-4.3.3.P1-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-client-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-devel-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-doc-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-relay-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-server-4.3.3.P1-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-client-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-devel-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-doc-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-relay-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-server-4.3.3.P1-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-client-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-devel-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-doc-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-relay-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-server-4.3.3.P1-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1892",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1892"
}
],
"notes": [
{
"category": "general",
"text": "dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1892",
"url": "https://www.suse.com/security/cve/CVE-2009-1892"
},
{
"category": "external",
"summary": "SUSE Bug 519413 for CVE-2009-1892",
"url": "https://bugzilla.suse.com/519413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1892"
},
{
"cve": "CVE-2010-2156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2156"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2156",
"url": "https://www.suse.com/security/cve/CVE-2010-2156"
},
{
"category": "external",
"summary": "SUSE Bug 612546 for CVE-2010-2156",
"url": "https://bugzilla.suse.com/612546"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2156"
},
{
"cve": "CVE-2010-3611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3611"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3611",
"url": "https://www.suse.com/security/cve/CVE-2010-3611"
},
{
"category": "external",
"summary": "SUSE Bug 650902 for CVE-2010-3611",
"url": "https://bugzilla.suse.com/650902"
},
{
"category": "external",
"summary": "SUSE Bug 667655 for CVE-2010-3611",
"url": "https://bugzilla.suse.com/667655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3611"
},
{
"cve": "CVE-2010-3616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3616"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3616",
"url": "https://www.suse.com/security/cve/CVE-2010-3616"
},
{
"category": "external",
"summary": "SUSE Bug 659059 for CVE-2010-3616",
"url": "https://bugzilla.suse.com/659059"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3616"
},
{
"cve": "CVE-2011-0413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0413"
}
],
"notes": [
{
"category": "general",
"text": "The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0413",
"url": "https://www.suse.com/security/cve/CVE-2011-0413"
},
{
"category": "external",
"summary": "SUSE Bug 667655 for CVE-2011-0413",
"url": "https://bugzilla.suse.com/667655"
},
{
"category": "external",
"summary": "SUSE Bug 680298 for CVE-2011-0413",
"url": "https://bugzilla.suse.com/680298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-0413"
},
{
"cve": "CVE-2011-0997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0997"
}
],
"notes": [
{
"category": "general",
"text": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0997",
"url": "https://www.suse.com/security/cve/CVE-2011-0997"
},
{
"category": "external",
"summary": "SUSE Bug 675052 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/675052"
},
{
"category": "external",
"summary": "SUSE Bug 689182 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/689182"
},
{
"category": "external",
"summary": "SUSE Bug 708527 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/708527"
},
{
"category": "external",
"summary": "SUSE Bug 715172 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/715172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-0997"
},
{
"cve": "CVE-2011-2748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-2748"
}
],
"notes": [
{
"category": "general",
"text": "The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-2748",
"url": "https://www.suse.com/security/cve/CVE-2011-2748"
},
{
"category": "external",
"summary": "SUSE Bug 712653 for CVE-2011-2748",
"url": "https://bugzilla.suse.com/712653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-2748"
},
{
"cve": "CVE-2011-2749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-2749"
}
],
"notes": [
{
"category": "general",
"text": "The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-2749",
"url": "https://www.suse.com/security/cve/CVE-2011-2749"
},
{
"category": "external",
"summary": "SUSE Bug 712653 for CVE-2011-2749",
"url": "https://bugzilla.suse.com/712653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-2749"
},
{
"cve": "CVE-2011-4539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4539"
}
],
"notes": [
{
"category": "general",
"text": "dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4539",
"url": "https://www.suse.com/security/cve/CVE-2011-4539"
},
{
"category": "external",
"summary": "SUSE Bug 735610 for CVE-2011-4539",
"url": "https://bugzilla.suse.com/735610"
},
{
"category": "external",
"summary": "SUSE Bug 741239 for CVE-2011-4539",
"url": "https://bugzilla.suse.com/741239"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4539"
},
{
"cve": "CVE-2011-4868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4868"
}
],
"notes": [
{
"category": "general",
"text": "The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4868",
"url": "https://www.suse.com/security/cve/CVE-2011-4868"
},
{
"category": "external",
"summary": "SUSE Bug 741239 for CVE-2011-4868",
"url": "https://bugzilla.suse.com/741239"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4868"
},
{
"cve": "CVE-2012-3570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3570"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3570",
"url": "https://www.suse.com/security/cve/CVE-2012-3570"
},
{
"category": "external",
"summary": "SUSE Bug 772924 for CVE-2012-3570",
"url": "https://bugzilla.suse.com/772924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-3570"
},
{
"cve": "CVE-2012-3571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3571"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3571",
"url": "https://www.suse.com/security/cve/CVE-2012-3571"
},
{
"category": "external",
"summary": "SUSE Bug 772924 for CVE-2012-3571",
"url": "https://bugzilla.suse.com/772924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-3571"
},
{
"cve": "CVE-2012-3954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3954"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3954",
"url": "https://www.suse.com/security/cve/CVE-2012-3954"
},
{
"category": "external",
"summary": "SUSE Bug 772924 for CVE-2012-3954",
"url": "https://bugzilla.suse.com/772924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2012-3954"
},
{
"cve": "CVE-2012-3955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3955"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3955",
"url": "https://www.suse.com/security/cve/CVE-2012-3955"
},
{
"category": "external",
"summary": "SUSE Bug 780167 for CVE-2012-3955",
"url": "https://bugzilla.suse.com/780167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2012-3955"
},
{
"cve": "CVE-2013-2266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2266"
}
],
"notes": [
{
"category": "general",
"text": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2266",
"url": "https://www.suse.com/security/cve/CVE-2013-2266"
},
{
"category": "external",
"summary": "SUSE Bug 811876 for CVE-2013-2266",
"url": "https://bugzilla.suse.com/811876"
},
{
"category": "external",
"summary": "SUSE Bug 811934 for CVE-2013-2266",
"url": "https://bugzilla.suse.com/811934"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-2266"
},
{
"cve": "CVE-2015-8605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8605"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8605",
"url": "https://www.suse.com/security/cve/CVE-2015-8605"
},
{
"category": "external",
"summary": "SUSE Bug 961305 for CVE-2015-8605",
"url": "https://bugzilla.suse.com/961305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-8605"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.