Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-3570 (GCVE-0-2012-3570)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:13:50.567Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "openSUSE-SU-2012:1006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html"
},
{
"name": "MDVSA-2012:115",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
},
{
"name": "GLSA-201301-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.isc.org/article/AA-00714"
},
{
"name": "54665",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/54665"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-07-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "openSUSE-SU-2012:1006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html"
},
{
"name": "MDVSA-2012:115",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
},
{
"name": "GLSA-201301-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.isc.org/article/AA-00714"
},
{
"name": "54665",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/54665"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3570",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2012:1006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html"
},
{
"name": "MDVSA-2012:115",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
},
{
"name": "GLSA-201301-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"name": "https://kb.isc.org/article/AA-00714",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/article/AA-00714"
},
{
"name": "54665",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54665"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-3570",
"datePublished": "2012-07-25T10:00:00",
"dateReserved": "2012-06-14T00:00:00",
"dateUpdated": "2024-08-06T20:13:50.567Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2012-3570\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-07-25T10:42:35.710\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de b\u00fafer en ISC DHCP v4.2.x antes de v4.2.4-P1, cuando el modo DHCPv6 est\u00e1 habilitado, permite a atacantes remotos causar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n y parada del demonio) a trav\u00e9s de un par\u00e1metro \\\"identificador de cliente\\\" modificado para tal fin.\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":5.7,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":5.5,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFCB588-F1C0-4276-993C-CB0FA2BE21F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"56113AB6-8295-4EB7-A003-79049FBB8B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"362DA97E-B940-4649-803F-26D8C1D16DA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"950A6BA0-C348-4B89-8C18-F2AFA467649F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9088D042-F104-4F31-AEBB-75F5A0F03AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F159908A-00E7-4EC8-8342-28182F547C4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49DF07-9612-43C7-9771-B76487B4A9CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE3EE047-6A23-4BFF-9576-9E4CA63BA153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0F06FC0-6477-4589-B9CB-24B1F893EF09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CCA07EB-B0CB-40EE-B62E-DB4C408717B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1707B3D-29F7-46C6-8A0A-D776E062FD4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"53551545-041A-456F-BC81-E05A6B3CB198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F3DBB40-638E-4A4B-99B4-534D2564E146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"493B7D92-18A4-4221-AEDD-917404C47E6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0C3173-8630-4613-B1D3-711468FC3749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F104AD27-0AE0-4853-B19C-1D83070A0DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65689412-A35D-40B9-8671-DE8FF63C3DCC\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201301-06.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:115\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/54665\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.isc.org/article/AA-00714\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201301-06.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/54665\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.isc.org/article/AA-00714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
ghsa-c23j-xrx5-hcrf
Vulnerability from github
Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
{
"affected": [],
"aliases": [
"CVE-2012-3570"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-07-25T10:42:00Z",
"severity": "MODERATE"
},
"details": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.",
"id": "GHSA-c23j-xrx5-hcrf",
"modified": "2022-05-17T03:46:33Z",
"published": "2022-05-17T03:46:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3570"
},
{
"type": "WEB",
"url": "https://kb.isc.org/article/AA-00714"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/54665"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2012-AVI-406
Vulnerability from certfr_avis
Plusieurs vulnérabilités ont été corrigées dans ISC DHCP. Elle peuvent être exploitées pour effectuer des attaques par déni de service à distance.
La première vulnérabilité (CVE-2012-3570) concerne les serveurs fonctionnant en mode DHCPv6.
La seconde vulnérabilité (CVE-2012-3571) est due à une erreur lors du traitement d'identifiants client malformés.
La dernière vulnérabilité (CVE-2012-3954) est due à des fuites mémoire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ISC DHCP 4.2.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "ISC",
"scada": false
}
}
},
{
"description": "ISC DHCP 4.1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "ISC",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3570"
},
{
"name": "CVE-2012-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3571"
},
{
"name": "CVE-2012-3954",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3954"
}
],
"initial_release_date": "2012-07-26T00:00:00",
"last_revision_date": "2012-07-26T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 ISC AA-00737 du 24 juillet 2012 :",
"url": "https://kb.isc.org/article/AA-00737"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 ISC AA-00714 du 24 juillet 2012 :",
"url": "https://kb.isc.org/article/AA-00714"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 ISC AA-00712 du 24 juillet 2012 :",
"url": "https://kb.isc.org/article/AA-00712"
}
],
"reference": "CERTA-2012-AVI-406",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-07-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans ISC DHCP. Elle peuvent\n\u00eatre exploit\u00e9es pour effectuer des attaques par d\u00e9ni de service \u00e0\ndistance.\n\nLa premi\u00e8re vuln\u00e9rabilit\u00e9 (CVE-2012-3570) concerne les serveurs\nfonctionnant en mode DHCPv6.\n\nLa seconde vuln\u00e9rabilit\u00e9 (CVE-2012-3571) est due \u00e0 une erreur lors du\ntraitement d\u0027identifiants client malform\u00e9s.\n\nLa derni\u00e8re vuln\u00e9rabilit\u00e9 (CVE-2012-3954) est due \u00e0 des fuites m\u00e9moire.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans ISC DHCP",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 ISC AA-00712, AA-00714 et AA-00737 du 24 juillet 2012",
"url": null
}
]
}
fkie_cve-2012-3570
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html | ||
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-201301-06.xml | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2012:115 | ||
| cve@mitre.org | http://www.securityfocus.com/bid/54665 | ||
| cve@mitre.org | https://kb.isc.org/article/AA-00714 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201301-06.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2012:115 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/54665 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.isc.org/article/AA-00714 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7AFCB588-F1C0-4276-993C-CB0FA2BE21F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "56113AB6-8295-4EB7-A003-79049FBB8B4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*",
"matchCriteriaId": "362DA97E-B940-4649-803F-26D8C1D16DA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "950A6BA0-C348-4B89-8C18-F2AFA467649F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "9088D042-F104-4F31-AEBB-75F5A0F03AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "F159908A-00E7-4EC8-8342-28182F547C4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1C49DF07-9612-43C7-9771-B76487B4A9CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3EE047-6A23-4BFF-9576-9E4CA63BA153",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*",
"matchCriteriaId": "C0F06FC0-6477-4589-B9CB-24B1F893EF09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6CCA07EB-B0CB-40EE-B62E-DB4C408717B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1707B3D-29F7-46C6-8A0A-D776E062FD4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*",
"matchCriteriaId": "53551545-041A-456F-BC81-E05A6B3CB198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0F3DBB40-638E-4A4B-99B4-534D2564E146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "493B7D92-18A4-4221-AEDD-917404C47E6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "FA0C3173-8630-4613-B1D3-711468FC3749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "F104AD27-0AE0-4853-B19C-1D83070A0DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65689412-A35D-40B9-8671-DE8FF63C3DCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter."
},
{
"lang": "es",
"value": "Un desbordamiento de b\u00fafer en ISC DHCP v4.2.x antes de v4.2.4-P1, cuando el modo DHCPv6 est\u00e1 habilitado, permite a atacantes remotos causar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n y parada del demonio) a trav\u00e9s de un par\u00e1metro \"identificador de cliente\" modificado para tal fin.\r\n"
}
],
"id": "CVE-2012-3570",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 5.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-07-25T10:42:35.710",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/54665"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-00714"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/54665"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-00714"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2012-3570
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2012-3570",
"description": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.",
"id": "GSD-2012-3570",
"references": [
"https://www.suse.com/security/cve/CVE-2012-3570.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-3570"
],
"details": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.",
"id": "GSD-2012-3570",
"modified": "2023-12-13T01:20:20.810747Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3570",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2012:1006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html"
},
{
"name": "MDVSA-2012:115",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
},
{
"name": "GLSA-201301-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"name": "https://kb.isc.org/article/AA-00714",
"refsource": "CONFIRM",
"url": "https://kb.isc.org/article/AA-00714"
},
{
"name": "54665",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54665"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-3570"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.isc.org/article/AA-00714",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-00714"
},
{
"name": "openSUSE-SU-2012:1006",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html"
},
{
"name": "MDVSA-2012:115",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115"
},
{
"name": "GLSA-201301-06",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"name": "54665",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/54665"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 5.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2016-11-28T19:08Z",
"publishedDate": "2012-07-25T10:42Z"
}
}
}
opensuse-su-2024:10358-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "dhcp-4.3.3.P1-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the dhcp-4.3.3.P1-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10358",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10358-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1892 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1892/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2156 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3611 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3616 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0413 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0997 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-2748 page",
"url": "https://www.suse.com/security/cve/CVE-2011-2748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-2749 page",
"url": "https://www.suse.com/security/cve/CVE-2011-2749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4539 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4868 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3570 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3571 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3954 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3955 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2266 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8605 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8605/"
}
],
"title": "dhcp-4.3.3.P1-3.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10358-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-client-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-devel-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-doc-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-relay-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-server-4.3.3.P1-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-client-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-devel-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-doc-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-relay-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-server-4.3.3.P1-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-client-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-devel-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-doc-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-relay-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-server-4.3.3.P1-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-client-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-devel-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-doc-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-relay-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-server-4.3.3.P1-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1892",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1892"
}
],
"notes": [
{
"category": "general",
"text": "dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1892",
"url": "https://www.suse.com/security/cve/CVE-2009-1892"
},
{
"category": "external",
"summary": "SUSE Bug 519413 for CVE-2009-1892",
"url": "https://bugzilla.suse.com/519413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1892"
},
{
"cve": "CVE-2010-2156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2156"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2156",
"url": "https://www.suse.com/security/cve/CVE-2010-2156"
},
{
"category": "external",
"summary": "SUSE Bug 612546 for CVE-2010-2156",
"url": "https://bugzilla.suse.com/612546"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2156"
},
{
"cve": "CVE-2010-3611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3611"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3611",
"url": "https://www.suse.com/security/cve/CVE-2010-3611"
},
{
"category": "external",
"summary": "SUSE Bug 650902 for CVE-2010-3611",
"url": "https://bugzilla.suse.com/650902"
},
{
"category": "external",
"summary": "SUSE Bug 667655 for CVE-2010-3611",
"url": "https://bugzilla.suse.com/667655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3611"
},
{
"cve": "CVE-2010-3616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3616"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3616",
"url": "https://www.suse.com/security/cve/CVE-2010-3616"
},
{
"category": "external",
"summary": "SUSE Bug 659059 for CVE-2010-3616",
"url": "https://bugzilla.suse.com/659059"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3616"
},
{
"cve": "CVE-2011-0413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0413"
}
],
"notes": [
{
"category": "general",
"text": "The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0413",
"url": "https://www.suse.com/security/cve/CVE-2011-0413"
},
{
"category": "external",
"summary": "SUSE Bug 667655 for CVE-2011-0413",
"url": "https://bugzilla.suse.com/667655"
},
{
"category": "external",
"summary": "SUSE Bug 680298 for CVE-2011-0413",
"url": "https://bugzilla.suse.com/680298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-0413"
},
{
"cve": "CVE-2011-0997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0997"
}
],
"notes": [
{
"category": "general",
"text": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0997",
"url": "https://www.suse.com/security/cve/CVE-2011-0997"
},
{
"category": "external",
"summary": "SUSE Bug 675052 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/675052"
},
{
"category": "external",
"summary": "SUSE Bug 689182 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/689182"
},
{
"category": "external",
"summary": "SUSE Bug 708527 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/708527"
},
{
"category": "external",
"summary": "SUSE Bug 715172 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/715172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-0997"
},
{
"cve": "CVE-2011-2748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-2748"
}
],
"notes": [
{
"category": "general",
"text": "The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-2748",
"url": "https://www.suse.com/security/cve/CVE-2011-2748"
},
{
"category": "external",
"summary": "SUSE Bug 712653 for CVE-2011-2748",
"url": "https://bugzilla.suse.com/712653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-2748"
},
{
"cve": "CVE-2011-2749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-2749"
}
],
"notes": [
{
"category": "general",
"text": "The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-2749",
"url": "https://www.suse.com/security/cve/CVE-2011-2749"
},
{
"category": "external",
"summary": "SUSE Bug 712653 for CVE-2011-2749",
"url": "https://bugzilla.suse.com/712653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-2749"
},
{
"cve": "CVE-2011-4539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4539"
}
],
"notes": [
{
"category": "general",
"text": "dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4539",
"url": "https://www.suse.com/security/cve/CVE-2011-4539"
},
{
"category": "external",
"summary": "SUSE Bug 735610 for CVE-2011-4539",
"url": "https://bugzilla.suse.com/735610"
},
{
"category": "external",
"summary": "SUSE Bug 741239 for CVE-2011-4539",
"url": "https://bugzilla.suse.com/741239"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4539"
},
{
"cve": "CVE-2011-4868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4868"
}
],
"notes": [
{
"category": "general",
"text": "The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4868",
"url": "https://www.suse.com/security/cve/CVE-2011-4868"
},
{
"category": "external",
"summary": "SUSE Bug 741239 for CVE-2011-4868",
"url": "https://bugzilla.suse.com/741239"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4868"
},
{
"cve": "CVE-2012-3570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3570"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3570",
"url": "https://www.suse.com/security/cve/CVE-2012-3570"
},
{
"category": "external",
"summary": "SUSE Bug 772924 for CVE-2012-3570",
"url": "https://bugzilla.suse.com/772924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-3570"
},
{
"cve": "CVE-2012-3571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3571"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3571",
"url": "https://www.suse.com/security/cve/CVE-2012-3571"
},
{
"category": "external",
"summary": "SUSE Bug 772924 for CVE-2012-3571",
"url": "https://bugzilla.suse.com/772924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-3571"
},
{
"cve": "CVE-2012-3954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3954"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3954",
"url": "https://www.suse.com/security/cve/CVE-2012-3954"
},
{
"category": "external",
"summary": "SUSE Bug 772924 for CVE-2012-3954",
"url": "https://bugzilla.suse.com/772924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2012-3954"
},
{
"cve": "CVE-2012-3955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3955"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3955",
"url": "https://www.suse.com/security/cve/CVE-2012-3955"
},
{
"category": "external",
"summary": "SUSE Bug 780167 for CVE-2012-3955",
"url": "https://bugzilla.suse.com/780167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2012-3955"
},
{
"cve": "CVE-2013-2266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2266"
}
],
"notes": [
{
"category": "general",
"text": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2266",
"url": "https://www.suse.com/security/cve/CVE-2013-2266"
},
{
"category": "external",
"summary": "SUSE Bug 811876 for CVE-2013-2266",
"url": "https://bugzilla.suse.com/811876"
},
{
"category": "external",
"summary": "SUSE Bug 811934 for CVE-2013-2266",
"url": "https://bugzilla.suse.com/811934"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-2266"
},
{
"cve": "CVE-2015-8605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8605"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8605",
"url": "https://www.suse.com/security/cve/CVE-2015-8605"
},
{
"category": "external",
"summary": "SUSE Bug 961305 for CVE-2015-8605",
"url": "https://bugzilla.suse.com/961305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-8605"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.