Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-1868 (GCVE-0-2015-1868)
Vulnerability from cvelistv5 – Published: 2015-05-18 15:00 – Updated: 2024-08-06 04:54
VLAI?
EPSS
Summary
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
10 references
| URL | Tags |
|---|---|
| http://lists.fedoraproject.org/pipermail/package-… | vendor-advisoryx_refsource_FEDORA |
| http://lists.fedoraproject.org/pipermail/package-… | vendor-advisoryx_refsource_FEDORA |
| http://lists.fedoraproject.org/pipermail/package-… | vendor-advisoryx_refsource_FEDORA |
| http://www.securityfocus.com/bid/74306 | vdb-entryx_refsource_BID |
| http://lists.fedoraproject.org/pipermail/package-… | vendor-advisoryx_refsource_FEDORA |
| http://lists.fedoraproject.org/pipermail/package-… | vendor-advisoryx_refsource_FEDORA |
| http://www.debian.org/security/2015/dsa-3306 | vendor-advisoryx_refsource_DEBIAN |
| http://www.debian.org/security/2015/dsa-3307 | vendor-advisoryx_refsource_DEBIAN |
| http://www.securitytracker.com/id/1032220 | vdb-entryx_refsource_SECTRACK |
| http://lists.fedoraproject.org/pipermail/package-… | vendor-advisoryx_refsource_FEDORA |
Date Public ?
2015-04-23 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:54:16.393Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2015-7079",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html"
},
{
"name": "FEDORA-2015-7031",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html"
},
{
"name": "FEDORA-2015-7018",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html"
},
{
"name": "74306",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/74306"
},
{
"name": "FEDORA-2015-7033",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html"
},
{
"name": "FEDORA-2015-7047",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html"
},
{
"name": "DSA-3306",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2015/dsa-3306"
},
{
"name": "DSA-3307",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2015/dsa-3307"
},
{
"name": "1032220",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1032220"
},
{
"name": "FEDORA-2015-7057",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-04-23T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-23T18:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "FEDORA-2015-7079",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html"
},
{
"name": "FEDORA-2015-7031",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html"
},
{
"name": "FEDORA-2015-7018",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html"
},
{
"name": "74306",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/74306"
},
{
"name": "FEDORA-2015-7033",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html"
},
{
"name": "FEDORA-2015-7047",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html"
},
{
"name": "DSA-3306",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2015/dsa-3306"
},
{
"name": "DSA-3307",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2015/dsa-3307"
},
{
"name": "1032220",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1032220"
},
{
"name": "FEDORA-2015-7057",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-1868",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2015-7079",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html"
},
{
"name": "FEDORA-2015-7031",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html"
},
{
"name": "FEDORA-2015-7018",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html"
},
{
"name": "74306",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74306"
},
{
"name": "FEDORA-2015-7033",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html"
},
{
"name": "FEDORA-2015-7047",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html"
},
{
"name": "DSA-3306",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3306"
},
{
"name": "DSA-3307",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3307"
},
{
"name": "1032220",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032220"
},
{
"name": "FEDORA-2015-7057",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2015-1868",
"datePublished": "2015-05-18T15:00:00.000Z",
"dateReserved": "2015-02-17T00:00:00.000Z",
"dateUpdated": "2024-08-06T04:54:16.393Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2015-1868",
"date": "2026-05-18",
"epss": "0.00506",
"percentile": "0.66438"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:authoritative:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5604347-1CAB-4BF7-A173-836B6EB16783\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:authoritative:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3370E07-8781-40EF-B265-2A3723E41F78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:authoritative:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEC5141A-8472-4A36-8A6D-124EDFE0941A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:authoritative:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AF8596A-D92F-4FEB-8B63-D6FDAD608792\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04A975C2-F387-4815-BDD7-F712AFFE1CE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91211D89-B43C-4D26-8ADE-90EEAFA44603\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CA372BE-95F8-48BA-A1AF-D9FEDF01AC18\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56BDB5A0-0839-4A20-A003-B8CD56F48171\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"253C303A-E577-4488-93E6-68A8DD942C38\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:recursor:3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3B8B634-42DC-4552-AAFB-D6849CB459C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:recursor:3.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1CF2AEB-1D4D-4F80-BBFE-071942C6C9AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:recursor:3.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0F59252-BF7E-4C15-A8EE-F96DCDABB2FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:recursor:3.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABCDEABD-572D-42BD-8A2B-1E97FFF17B3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:recursor:3.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A3DFC6B-B0C3-499C-9AE6-8974A2681974\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:recursor:3.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B325D31-8746-4811-B3AD-3CC1F02D0E18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:recursor:3.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70D0E4BB-34A1-4E94-A58B-25DD7C984815\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:recursor:3.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BC3F136-8B89-48DE-81A6-2D3FA9BE6A0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79723D52-8A9E-42B5-AF68-4DBF4758783E\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.\"}, {\"lang\": \"es\", \"value\": \"La funcionalidad de la decompresi\\u00f3n de etiquetas en PowerDNS Recursor 3.5.x, 3.6.x anterior a 3.6.3, y 3.7.x anterior a 3.7.2 y Authoritative (Auth) Server 3.2.x, 3.3.x anterior a 3.3.2, y 3.4.x anterior a 3.4.4 permite a atacantes remotos causar una denegaci\\u00f3n de servicio (consumo de CPU o ca\\u00edda) a trav\\u00e9s de una solicitud con un nombre que se hace referencia a si mismo.\"}]",
"id": "CVE-2015-1868",
"lastModified": "2024-11-21T02:26:18.213",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2015-05-18T15:59:05.823",
"references": "[{\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2015/dsa-3306\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2015/dsa-3307\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/74306\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1032220\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2015/dsa-3306\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2015/dsa-3307\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/74306\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1032220\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2015-1868\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-05-18T15:59:05.823\",\"lastModified\":\"2026-05-06T22:30:45.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad de la decompresi\u00f3n de etiquetas en PowerDNS Recursor 3.5.x, 3.6.x anterior a 3.6.3, y 3.7.x anterior a 3.7.2 y Authoritative (Auth) Server 3.2.x, 3.3.x anterior a 3.3.2, y 3.4.x anterior a 3.4.4 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU o ca\u00edda) a trav\u00e9s de una solicitud con un nombre que se hace referencia a si mismo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:authoritative:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5604347-1CAB-4BF7-A173-836B6EB16783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:authoritative:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3370E07-8781-40EF-B265-2A3723E41F78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:authoritative:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEC5141A-8472-4A36-8A6D-124EDFE0941A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:authoritative:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF8596A-D92F-4FEB-8B63-D6FDAD608792\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A975C2-F387-4815-BDD7-F712AFFE1CE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91211D89-B43C-4D26-8ADE-90EEAFA44603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA372BE-95F8-48BA-A1AF-D9FEDF01AC18\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56BDB5A0-0839-4A20-A003-B8CD56F48171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253C303A-E577-4488-93E6-68A8DD942C38\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:recursor:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B8B634-42DC-4552-AAFB-D6849CB459C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:recursor:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1CF2AEB-1D4D-4F80-BBFE-071942C6C9AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:recursor:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F59252-BF7E-4C15-A8EE-F96DCDABB2FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:recursor:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABCDEABD-572D-42BD-8A2B-1E97FFF17B3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:recursor:3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A3DFC6B-B0C3-499C-9AE6-8974A2681974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:recursor:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B325D31-8746-4811-B3AD-3CC1F02D0E18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:recursor:3.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D0E4BB-34A1-4E94-A58B-25DD7C984815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:recursor:3.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BC3F136-8B89-48DE-81A6-2D3FA9BE6A0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79723D52-8A9E-42B5-AF68-4DBF4758783E\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3306\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3307\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/74306\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1032220\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3306\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3307\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/74306\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1032220\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
GSD-2015-1868
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2015-1868",
"description": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.",
"id": "GSD-2015-1868",
"references": [
"https://www.suse.com/security/cve/CVE-2015-1868.html",
"https://advisories.mageia.org/CVE-2015-1868.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-1868"
],
"details": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.",
"id": "GSD-2015-1868",
"modified": "2023-12-13T01:20:05.456626Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-1868",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2015-7079",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html"
},
{
"name": "FEDORA-2015-7031",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html"
},
{
"name": "FEDORA-2015-7018",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html"
},
{
"name": "74306",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74306"
},
{
"name": "FEDORA-2015-7033",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html"
},
{
"name": "FEDORA-2015-7047",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html"
},
{
"name": "DSA-3306",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3306"
},
{
"name": "DSA-3307",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3307"
},
{
"name": "1032220",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032220"
},
{
"name": "FEDORA-2015-7057",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:powerdns:authoritative:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:authoritative:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:authoritative:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:authoritative:3.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-1868"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2015-7031",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html"
},
{
"name": "FEDORA-2015-7018",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html"
},
{
"name": "FEDORA-2015-7033",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html"
},
{
"name": "FEDORA-2015-7057",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html"
},
{
"name": "FEDORA-2015-7079",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html"
},
{
"name": "FEDORA-2015-7047",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html"
},
{
"name": "1032220",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory"
],
"url": "http://www.securitytracker.com/id/1032220"
},
{
"name": "74306",
"refsource": "BID",
"tags": [
"Third Party Advisory"
],
"url": "http://www.securityfocus.com/bid/74306"
},
{
"name": "DSA-3307",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2015/dsa-3307"
},
{
"name": "DSA-3306",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2015/dsa-3306"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2016-12-28T02:59Z",
"publishedDate": "2015-05-18T15:59Z"
}
}
}
OPENSUSE-SU-2024:10136-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
pdns-4.0.1-1.2 on GA media
Severity
Moderate
Notes
Title of the patch: pdns-4.0.1-1.2 on GA media
Description of the patch: These are all security issues fixed in the pdns-4.0.1-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10136
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.8 (Medium)
Affected products
Recommended
40 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
15 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "pdns-4.0.1-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the pdns-4.0.1-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10136",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10136-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0206 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1868 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5230 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6172 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6172/"
}
],
"title": "pdns-4.0.1-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10136-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "pdns-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-4.0.1-1.2.aarch64",
"product_id": "pdns-4.0.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "pdns-backend-geoip-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-backend-geoip-4.0.1-1.2.aarch64",
"product_id": "pdns-backend-geoip-4.0.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "pdns-backend-godbc-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-backend-godbc-4.0.1-1.2.aarch64",
"product_id": "pdns-backend-godbc-4.0.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "pdns-backend-ldap-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-backend-ldap-4.0.1-1.2.aarch64",
"product_id": "pdns-backend-ldap-4.0.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "pdns-backend-lua-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-backend-lua-4.0.1-1.2.aarch64",
"product_id": "pdns-backend-lua-4.0.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "pdns-backend-mydns-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-backend-mydns-4.0.1-1.2.aarch64",
"product_id": "pdns-backend-mydns-4.0.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "pdns-backend-mysql-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-backend-mysql-4.0.1-1.2.aarch64",
"product_id": "pdns-backend-mysql-4.0.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "pdns-backend-postgresql-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-backend-postgresql-4.0.1-1.2.aarch64",
"product_id": "pdns-backend-postgresql-4.0.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "pdns-backend-remote-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-backend-remote-4.0.1-1.2.aarch64",
"product_id": "pdns-backend-remote-4.0.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"product": {
"name": "pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"product_id": "pdns-backend-sqlite3-4.0.1-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "pdns-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-4.0.1-1.2.ppc64le",
"product_id": "pdns-4.0.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "pdns-backend-geoip-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-backend-geoip-4.0.1-1.2.ppc64le",
"product_id": "pdns-backend-geoip-4.0.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "pdns-backend-godbc-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-backend-godbc-4.0.1-1.2.ppc64le",
"product_id": "pdns-backend-godbc-4.0.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "pdns-backend-ldap-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-backend-ldap-4.0.1-1.2.ppc64le",
"product_id": "pdns-backend-ldap-4.0.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "pdns-backend-lua-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-backend-lua-4.0.1-1.2.ppc64le",
"product_id": "pdns-backend-lua-4.0.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "pdns-backend-mydns-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-backend-mydns-4.0.1-1.2.ppc64le",
"product_id": "pdns-backend-mydns-4.0.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "pdns-backend-mysql-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-backend-mysql-4.0.1-1.2.ppc64le",
"product_id": "pdns-backend-mysql-4.0.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"product_id": "pdns-backend-postgresql-4.0.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "pdns-backend-remote-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-backend-remote-4.0.1-1.2.ppc64le",
"product_id": "pdns-backend-remote-4.0.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"product": {
"name": "pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"product_id": "pdns-backend-sqlite3-4.0.1-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "pdns-4.0.1-1.2.s390x",
"product": {
"name": "pdns-4.0.1-1.2.s390x",
"product_id": "pdns-4.0.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "pdns-backend-geoip-4.0.1-1.2.s390x",
"product": {
"name": "pdns-backend-geoip-4.0.1-1.2.s390x",
"product_id": "pdns-backend-geoip-4.0.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "pdns-backend-godbc-4.0.1-1.2.s390x",
"product": {
"name": "pdns-backend-godbc-4.0.1-1.2.s390x",
"product_id": "pdns-backend-godbc-4.0.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "pdns-backend-ldap-4.0.1-1.2.s390x",
"product": {
"name": "pdns-backend-ldap-4.0.1-1.2.s390x",
"product_id": "pdns-backend-ldap-4.0.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "pdns-backend-lua-4.0.1-1.2.s390x",
"product": {
"name": "pdns-backend-lua-4.0.1-1.2.s390x",
"product_id": "pdns-backend-lua-4.0.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "pdns-backend-mydns-4.0.1-1.2.s390x",
"product": {
"name": "pdns-backend-mydns-4.0.1-1.2.s390x",
"product_id": "pdns-backend-mydns-4.0.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "pdns-backend-mysql-4.0.1-1.2.s390x",
"product": {
"name": "pdns-backend-mysql-4.0.1-1.2.s390x",
"product_id": "pdns-backend-mysql-4.0.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "pdns-backend-postgresql-4.0.1-1.2.s390x",
"product": {
"name": "pdns-backend-postgresql-4.0.1-1.2.s390x",
"product_id": "pdns-backend-postgresql-4.0.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "pdns-backend-remote-4.0.1-1.2.s390x",
"product": {
"name": "pdns-backend-remote-4.0.1-1.2.s390x",
"product_id": "pdns-backend-remote-4.0.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "pdns-backend-sqlite3-4.0.1-1.2.s390x",
"product": {
"name": "pdns-backend-sqlite3-4.0.1-1.2.s390x",
"product_id": "pdns-backend-sqlite3-4.0.1-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pdns-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-4.0.1-1.2.x86_64",
"product_id": "pdns-4.0.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "pdns-backend-geoip-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-backend-geoip-4.0.1-1.2.x86_64",
"product_id": "pdns-backend-geoip-4.0.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "pdns-backend-godbc-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-backend-godbc-4.0.1-1.2.x86_64",
"product_id": "pdns-backend-godbc-4.0.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "pdns-backend-ldap-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-backend-ldap-4.0.1-1.2.x86_64",
"product_id": "pdns-backend-ldap-4.0.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "pdns-backend-lua-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-backend-lua-4.0.1-1.2.x86_64",
"product_id": "pdns-backend-lua-4.0.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "pdns-backend-mydns-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-backend-mydns-4.0.1-1.2.x86_64",
"product_id": "pdns-backend-mydns-4.0.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "pdns-backend-mysql-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-backend-mysql-4.0.1-1.2.x86_64",
"product_id": "pdns-backend-mysql-4.0.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "pdns-backend-postgresql-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-backend-postgresql-4.0.1-1.2.x86_64",
"product_id": "pdns-backend-postgresql-4.0.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "pdns-backend-remote-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-backend-remote-4.0.1-1.2.x86_64",
"product_id": "pdns-backend-remote-4.0.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "pdns-backend-sqlite3-4.0.1-1.2.x86_64",
"product": {
"name": "pdns-backend-sqlite3-4.0.1-1.2.x86_64",
"product_id": "pdns-backend-sqlite3-4.0.1-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x"
},
"product_reference": "pdns-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-geoip-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-backend-geoip-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-geoip-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-backend-geoip-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-geoip-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x"
},
"product_reference": "pdns-backend-geoip-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-geoip-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-backend-geoip-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-godbc-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-backend-godbc-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-godbc-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-backend-godbc-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-godbc-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x"
},
"product_reference": "pdns-backend-godbc-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-godbc-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-backend-godbc-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-ldap-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-backend-ldap-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-ldap-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-backend-ldap-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-ldap-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x"
},
"product_reference": "pdns-backend-ldap-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-ldap-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-backend-ldap-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-lua-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-backend-lua-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-lua-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-backend-lua-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-lua-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x"
},
"product_reference": "pdns-backend-lua-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-lua-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-backend-lua-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-mydns-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-backend-mydns-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-mydns-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-backend-mydns-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-mydns-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x"
},
"product_reference": "pdns-backend-mydns-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-mydns-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-backend-mydns-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-mysql-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-backend-mysql-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-mysql-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-backend-mysql-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-mysql-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x"
},
"product_reference": "pdns-backend-mysql-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-mysql-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-backend-mysql-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-postgresql-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-backend-postgresql-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-postgresql-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-postgresql-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x"
},
"product_reference": "pdns-backend-postgresql-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-postgresql-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-backend-postgresql-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-remote-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-backend-remote-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-remote-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-backend-remote-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-remote-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x"
},
"product_reference": "pdns-backend-remote-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-remote-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-backend-remote-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-sqlite3-4.0.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64"
},
"product_reference": "pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-sqlite3-4.0.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le"
},
"product_reference": "pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-sqlite3-4.0.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x"
},
"product_reference": "pdns-backend-sqlite3-4.0.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-backend-sqlite3-4.0.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
},
"product_reference": "pdns-backend-sqlite3-4.0.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-0206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0206"
}
],
"notes": [
{
"category": "general",
"text": "common_startup.cc in PowerDNS (aka pdns) Authoritative Server before 2.9.22.5 and 3.x before 3.0.1 allows remote attackers to cause a denial of service (packet loop) via a crafted UDP DNS response.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0206",
"url": "https://www.suse.com/security/cve/CVE-2012-0206"
},
{
"category": "external",
"summary": "SUSE Bug 740255 for CVE-2012-0206",
"url": "https://bugzilla.suse.com/740255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0206"
},
{
"cve": "CVE-2015-1868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1868"
}
],
"notes": [
{
"category": "general",
"text": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1868",
"url": "https://www.suse.com/security/cve/CVE-2015-1868"
},
{
"category": "external",
"summary": "SUSE Bug 927569 for CVE-2015-1868",
"url": "https://bugzilla.suse.com/927569"
},
{
"category": "external",
"summary": "SUSE Bug 943078 for CVE-2015-1868",
"url": "https://bugzilla.suse.com/943078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-1868"
},
{
"cve": "CVE-2015-5230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5230"
}
],
"notes": [
{
"category": "general",
"text": "The DNS packet parsing/generation code in PowerDNS (aka pdns) Authoritative Server 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via crafted query packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5230",
"url": "https://www.suse.com/security/cve/CVE-2015-5230"
},
{
"category": "external",
"summary": "SUSE Bug 943078 for CVE-2015-5230",
"url": "https://bugzilla.suse.com/943078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-5230"
},
{
"cve": "CVE-2016-6172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6172"
}
],
"notes": [
{
"category": "general",
"text": "PowerDNS (aka pdns) Authoritative Server before 4.0.1 allows remote primary DNS servers to cause a denial of service (memory exhaustion and secondary DNS server crash) via a large (1) AXFR or (2) IXFR response.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6172",
"url": "https://www.suse.com/security/cve/CVE-2016-6172"
},
{
"category": "external",
"summary": "SUSE Bug 987872 for CVE-2016-6172",
"url": "https://bugzilla.suse.com/987872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:pdns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-geoip-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-godbc-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-ldap-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-lua-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mydns-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-mysql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-postgresql-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-remote-4.0.1-1.2.x86_64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.aarch64",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.s390x",
"openSUSE Tumbleweed:pdns-backend-sqlite3-4.0.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-6172"
}
]
}
OPENSUSE-SU-2024:10537-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
pdns-recursor-4.0.3-1.2 on GA media
Severity
Moderate
Notes
Title of the patch: pdns-recursor-4.0.3-1.2 on GA media
Description of the patch: These are all security issues fixed in the pdns-recursor-4.0.3-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10537
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.8 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
15 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "pdns-recursor-4.0.3-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the pdns-recursor-4.0.3-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10537",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10537-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-4009 page",
"url": "https://www.suse.com/security/cve/CVE-2009-4009/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8601 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1868 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6172 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6172/"
}
],
"title": "pdns-recursor-4.0.3-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10537-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "pdns-recursor-4.0.3-1.2.aarch64",
"product": {
"name": "pdns-recursor-4.0.3-1.2.aarch64",
"product_id": "pdns-recursor-4.0.3-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "pdns-recursor-4.0.3-1.2.ppc64le",
"product": {
"name": "pdns-recursor-4.0.3-1.2.ppc64le",
"product_id": "pdns-recursor-4.0.3-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "pdns-recursor-4.0.3-1.2.s390x",
"product": {
"name": "pdns-recursor-4.0.3-1.2.s390x",
"product_id": "pdns-recursor-4.0.3-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pdns-recursor-4.0.3-1.2.x86_64",
"product": {
"name": "pdns-recursor-4.0.3-1.2.x86_64",
"product_id": "pdns-recursor-4.0.3-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-recursor-4.0.3-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64"
},
"product_reference": "pdns-recursor-4.0.3-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-recursor-4.0.3-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le"
},
"product_reference": "pdns-recursor-4.0.3-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-recursor-4.0.3-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x"
},
"product_reference": "pdns-recursor-4.0.3-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pdns-recursor-4.0.3-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
},
"product_reference": "pdns-recursor-4.0.3-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4009",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-4009"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-4009",
"url": "https://www.suse.com/security/cve/CVE-2009-4009"
},
{
"category": "external",
"summary": "SUSE Bug 567990 for CVE-2009-4009",
"url": "https://bugzilla.suse.com/567990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2009-4009"
},
{
"cve": "CVE-2014-8601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8601"
}
],
"notes": [
{
"category": "general",
"text": "PowerDNS Recursor before 3.6.2 does not limit delegation chaining, which allows remote attackers to cause a denial of service (\"performance degradations\") via a large or infinite number of referrals, as demonstrated by resolving domains hosted by ezdns.it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8601",
"url": "https://www.suse.com/security/cve/CVE-2014-8601"
},
{
"category": "external",
"summary": "SUSE Bug 906583 for CVE-2014-8601",
"url": "https://bugzilla.suse.com/906583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-8601"
},
{
"cve": "CVE-2015-1868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1868"
}
],
"notes": [
{
"category": "general",
"text": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1868",
"url": "https://www.suse.com/security/cve/CVE-2015-1868"
},
{
"category": "external",
"summary": "SUSE Bug 927569 for CVE-2015-1868",
"url": "https://bugzilla.suse.com/927569"
},
{
"category": "external",
"summary": "SUSE Bug 943078 for CVE-2015-1868",
"url": "https://bugzilla.suse.com/943078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-1868"
},
{
"cve": "CVE-2016-6172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6172"
}
],
"notes": [
{
"category": "general",
"text": "PowerDNS (aka pdns) Authoritative Server before 4.0.1 allows remote primary DNS servers to cause a denial of service (memory exhaustion and secondary DNS server crash) via a large (1) AXFR or (2) IXFR response.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6172",
"url": "https://www.suse.com/security/cve/CVE-2016-6172"
},
{
"category": "external",
"summary": "SUSE Bug 987872 for CVE-2016-6172",
"url": "https://bugzilla.suse.com/987872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.aarch64",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.ppc64le",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.s390x",
"openSUSE Tumbleweed:pdns-recursor-4.0.3-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-6172"
}
]
}
FKIE_CVE-2015-1868
Vulnerability from fkie_nvd - Published: 2015-05-18 15:59 - Updated: 2026-05-06 22:30
Severity ?
Summary
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| powerdns | authoritative | 3.2 | |
| powerdns | authoritative | 3.3 | |
| powerdns | authoritative | 3.3.1 | |
| powerdns | authoritative | 3.3.2 | |
| powerdns | authoritative | 3.4.0 | |
| powerdns | authoritative | 3.4.1 | |
| powerdns | authoritative | 3.4.3 | |
| fedoraproject | fedora | 20 | |
| fedoraproject | fedora | 21 | |
| fedoraproject | fedora | 22 | |
| powerdns | recursor | 3.5 | |
| powerdns | recursor | 3.5.1 | |
| powerdns | recursor | 3.5.2 | |
| powerdns | recursor | 3.5.3 | |
| powerdns | recursor | 3.6.0 | |
| powerdns | recursor | 3.6.1 | |
| powerdns | recursor | 3.6.2 | |
| powerdns | recursor | 3.6.3 | |
| powerdns | recursor | 3.7.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:powerdns:authoritative:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F5604347-1CAB-4BF7-A173-836B6EB16783",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:authoritative:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F3370E07-8781-40EF-B265-2A3723E41F78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:authoritative:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC5141A-8472-4A36-8A6D-124EDFE0941A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:authoritative:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF8596A-D92F-4FEB-8B63-D6FDAD608792",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "04A975C2-F387-4815-BDD7-F712AFFE1CE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91211D89-B43C-4D26-8ADE-90EEAFA44603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA372BE-95F8-48BA-A1AF-D9FEDF01AC18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:powerdns:recursor:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B8B634-42DC-4552-AAFB-D6849CB459C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:recursor:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A1CF2AEB-1D4D-4F80-BBFE-071942C6C9AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:recursor:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F59252-BF7E-4C15-A8EE-F96DCDABB2FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:recursor:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ABCDEABD-572D-42BD-8A2B-1E97FFF17B3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:recursor:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A3DFC6B-B0C3-499C-9AE6-8974A2681974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:recursor:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B325D31-8746-4811-B3AD-3CC1F02D0E18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:recursor:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "70D0E4BB-34A1-4E94-A58B-25DD7C984815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:recursor:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC3F136-8B89-48DE-81A6-2D3FA9BE6A0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "79723D52-8A9E-42B5-AF68-4DBF4758783E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself."
},
{
"lang": "es",
"value": "La funcionalidad de la decompresi\u00f3n de etiquetas en PowerDNS Recursor 3.5.x, 3.6.x anterior a 3.6.3, y 3.7.x anterior a 3.7.2 y Authoritative (Auth) Server 3.2.x, 3.3.x anterior a 3.3.2, y 3.4.x anterior a 3.4.4 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU o ca\u00edda) a trav\u00e9s de una solicitud con un nombre que se hace referencia a si mismo."
}
],
"id": "CVE-2015-1868",
"lastModified": "2026-05-06T22:30:45.220",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-05-18T15:59:05.823",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2015/dsa-3306"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2015/dsa-3307"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.securityfocus.com/bid/74306"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.securitytracker.com/id/1032220"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2015/dsa-3306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2015/dsa-3307"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.securityfocus.com/bid/74306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.securitytracker.com/id/1032220"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-9R88-88V4-3J6C
Vulnerability from github – Published: 2022-05-17 03:15 – Updated: 2022-05-17 03:15
VLAI?
Details
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.
{
"affected": [],
"aliases": [
"CVE-2015-1868"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-05-18T15:59:00Z",
"severity": "HIGH"
},
"details": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.",
"id": "GHSA-9r88-88v4-3j6c",
"modified": "2022-05-17T03:15:10Z",
"published": "2022-05-17T03:15:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1868"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2015/dsa-3306"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2015/dsa-3307"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/74306"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1032220"
}
],
"schema_version": "1.4.0",
"severity": []
}
CNVD-2015-02740
Vulnerability from cnvd - Published: 2015-04-28
VLAI Severity ?
Title
PowerDNS Recursor和Authoritative Server标签拒绝服务漏洞
Description
PowerDNS Recursor是一款域名解析服务器。PowerDNS Authoritative Server是一款DNS服务器。
PowerDNS Recursor和Authoritative Server程序处理压缩的标签时存在错误,允许攻击者可利用漏洞触发递归循环,消耗CPU资源。
Severity
中
Patch Name
PowerDNS Recursor和Authoritative Server标签拒绝服务漏洞的补丁
Patch Description
PowerDNS Recursor是一款域名解析服务器。PowerDNS Authoritative Server是一款DNS服务器。
PowerDNS Recursor和Authoritative Server程序处理压缩的标签时存在错误,允许攻击者可利用漏洞触发递归循环,消耗CPU资源。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
Reference
http://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
Impacted products
| Name | ['PowerDNS Recursor >= 3.5', 'PowerDNS Authoritative Server >= 3.2'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-1868"
}
},
"description": "PowerDNS Recursor\u662f\u4e00\u6b3e\u57df\u540d\u89e3\u6790\u670d\u52a1\u5668\u3002PowerDNS Authoritative Server\u662f\u4e00\u6b3eDNS\u670d\u52a1\u5668\u3002\r\n\r\nPowerDNS Recursor\u548cAuthoritative Server\u7a0b\u5e8f\u5904\u7406\u538b\u7f29\u7684\u6807\u7b7e\u65f6\u5b58\u5728\u9519\u8bef\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u89e6\u53d1\u9012\u5f52\u5faa\u73af\uff0c\u6d88\u8017CPU\u8d44\u6e90\u3002",
"discovererName": "Aki Tuomi",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://doc.powerdns.com/md/security/powerdns-advisory-2015-01/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-02740",
"openTime": "2015-04-28",
"patchDescription": "PowerDNS Recursor\u662f\u4e00\u6b3e\u57df\u540d\u89e3\u6790\u670d\u52a1\u5668\u3002PowerDNS Authoritative Server\u662f\u4e00\u6b3eDNS\u670d\u52a1\u5668\u3002\r\n\r\nPowerDNS Recursor\u548cAuthoritative Server\u7a0b\u5e8f\u5904\u7406\u538b\u7f29\u7684\u6807\u7b7e\u65f6\u5b58\u5728\u9519\u8bef\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u89e6\u53d1\u9012\u5f52\u5faa\u73af\uff0c\u6d88\u8017CPU\u8d44\u6e90\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "PowerDNS Recursor\u548cAuthoritative Server\u6807\u7b7e\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"PowerDNS Recursor \u003e= 3.5",
"PowerDNS Authoritative Server \u003e= 3.2"
]
},
"referenceLink": "http://doc.powerdns.com/md/security/powerdns-advisory-2015-01/",
"serverity": "\u4e2d",
"submitTime": "2015-04-26",
"title": "PowerDNS Recursor\u548cAuthoritative Server\u6807\u7b7e\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…