{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for coredns","title":"Title of the patch"},{"category":"description","text":"This update for coredns fixes the following issues:\n\nUpdate to version 1.11.3:\n\n  * optimize the performance for high qps (#6767)\n  * bump deps\n  * Fix zone parser error handling (#6680)\n  * Add alternate option to forward plugin (#6681)\n  * fix: plugin/file: return error when parsing the file fails (#6699)\n  * [fix:documentation] Clarify autopath README (#6750)\n  * Fix outdated test (#6747)\n  * Bump go version from 1.21.8 to 1.21.11 (#6755)\n  * Generate zplugin.go correctly with third-party plugins (#6692)\n  * dnstap: uses pointer receiver for small response writer (#6644)\n  * chore: fix function name in comment (#6608)\n  * [plugin/forward] Strip local zone from IPV6 nameservers (#6635)\n- fixes CVE-2023-30464\n- fixes CVE-2023-28452\n\nUpdate to upstream head (git commit #5a52707):\n\n  * bump deps to address security issue CVE-2024-22189\n  * Return RcodeServerFailure when DNS64 has no next plugin (#6590)\n  * add plusserver to adopters (#6565)\n  * Change the log flags to be a variable that can be set prior to calling Run (#6546)\n  * Enable Prometheus native histograms (#6524)\n  * forward: respect context (#6483)\n  * add client labels to k8s plugin metadata (#6475)\n  * fix broken link in webpage (#6488)\n  * Repo controlled Go version (#6526)\n  * removed the mutex locks with atomic bool (#6525)\n\nUpdate to version 1.11.2:\n\n  * rewrite: fix multi request concurrency issue in cname rewrite  (#6407)\n  * plugin/tls: respect the path specified by root plugin (#6138)\n  * plugin/auto: warn when auto is unable to read elements of the directory tree (#6333)\n  * fix: make the codeowners link relative (#6397)\n  * plugin/etcd: the etcd client adds the DialKeepAliveTime parameter (#6351)\n  * plugin/cache: key cache on Checking Disabled (CD) bit (#6354)\n  * Use the correct root domain name in the proxy plugin's TestHealthX tests (#6395)\n  * Add PITS Global Data Recovery Services as an adopter (#6304)\n  * Handle UDP responses that overflow with TC bit with test case (#6277)\n  * plugin/rewrite: add rcode as a rewrite option (#6204)\n\n- CVE-2024-0874: coredns: CD bit response is cached and served later\n\n- Update to version 1.11.1:\n\n  * Revert “plugin/forward: Continue waiting after receiving malformed responses\n  * plugin/dnstap: add support for “extra” field in payload\n  * plugin/cache: fix keepttl parsing\n\n- Update to version 1.11.0:\n\n  * Adds support for accepting DNS connections over QUIC (doq).\n  * Adds CNAME target rewrites to the rewrite plugin.\n  * Plus many bug fixes, and some security improvements.\n  * This release introduces the following backward incompatible changes:\n   + In the kubernetes plugin, we have dropped support for watching Endpoint and Endpointslice v1beta, \n     since all supported K8s versions now use Endpointslice.\n   + The bufsize plugin changed its default size limit value to 1232\n   + Some changes to forward plugin metrics.\n\n- Update to version 1.10.1:\n\n  * Corrected architecture labels in multi-arch image manifest\n  * A new plugin timeouts that allows configuration of server listener timeout durations\n  * acl can drop queries as an action\n  * template supports creating responses with extended DNS errors\n  * New weighted policy in loadbalance\n  * Option to serve original record TTLs from cache\n\n- Update to version 1.10.0:\n\n\t* core: add log listeners for k8s_event plugin (#5451)\n\t* core: log DoH HTTP server error logs in CoreDNS format (#5457)\n\t* core: warn when domain names are not in RFC1035 preferred syntax (#5414)\n\t* plugin/acl: add support for extended DNS errors (#5532)\n\t* plugin/bufsize: do not expand query UDP buffer size if already set to a smaller value (#5602)\n\t* plugin/cache: add cache disable option (#5540)\n\t* plugin/cache: add metadata for wildcard record responses (#5308)\n\t* plugin/cache: add option to adjust SERVFAIL response cache TTL (#5320)\n\t* plugin/cache: correct responses to Authenticated Data requests (#5191)\n\t* plugin/dnstap: add identity and version support for the dnstap plugin (#5555)\n\t* plugin/file: add metadata for wildcard record responses (#5308)\n\t* plugin/forward: enable multiple forward declarations (#5127)\n\t* plugin/forward: health_check needs to normalize a specified domain name (#5543)\n\t* plugin/forward: remove unused coredns_forward_sockets_open metric (#5431)\n\t* plugin/header: add support for query modification (#5556)\n\t* plugin/health: bypass proxy in self health check (#5401)\n\t* plugin/health: don't go lameduck when reloading (#5472)\n\t* plugin/k8s_external: add support for PTR requests (#5435)\n\t* plugin/k8s_external: resolve headless services (#5505)\n\t* plugin/kubernetes: make kubernetes client log in CoreDNS format (#5461)\n\t* plugin/ready: reset list of readiness plugins on startup (#5492)\n\t* plugin/rewrite: add PTR records to supported types (#5565)\n\t* plugin/rewrite: fix a crash in rewrite plugin when rule type is missing (#5459)\n\t* plugin/rewrite: fix out-of-index issue in rewrite plugin (#5462)\n\t* plugin/rewrite: support min and max TTL values (#5508)\n\t* plugin/trace : make zipkin HTTP reporter more configurable using Corefile (#5460)\n\t* plugin/trace: read trace context info from headers for DOH (#5439)\n\t* plugin/tsig: add new plugin TSIG for validating TSIG requests and signing responses (#4957)\n\t* core: update gopkg.in/yaml.v3 to fix CVE-2022-28948 \n\t* core: update golang.org/x/crypto to fix CVE-2022-27191 \n\t* plugin/acl: adding a check to parse out zone info \n\t* plugin/dnstap: support FQDN TCP endpoint \n\t* plugin/errors: add stacktrace option to log a stacktrace during panic recovery \n\t* plugin/template: return SERVFAIL for zone-match regex-no-match case \n","title":"Description of the patch"},{"category":"details","text":"openSUSE-2024-319","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0319-1.json"},{"category":"self","summary":"URL for openSUSE-SU-2024:0319-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/"},{"category":"self","summary":"E-Mail link for openSUSE-SU-2024:0319-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/"},{"category":"self","summary":"SUSE CVE CVE-2022-27191 page","url":"https://www.suse.com/security/cve/CVE-2022-27191/"},{"category":"self","summary":"SUSE CVE CVE-2022-28948 page","url":"https://www.suse.com/security/cve/CVE-2022-28948/"},{"category":"self","summary":"SUSE CVE CVE-2023-28452 page","url":"https://www.suse.com/security/cve/CVE-2023-28452/"},{"category":"self","summary":"SUSE CVE CVE-2023-30464 page","url":"https://www.suse.com/security/cve/CVE-2023-30464/"},{"category":"self","summary":"SUSE CVE CVE-2024-0874 page","url":"https://www.suse.com/security/cve/CVE-2024-0874/"},{"category":"self","summary":"SUSE CVE CVE-2024-22189 page","url":"https://www.suse.com/security/cve/CVE-2024-22189/"}],"title":"Security update for coredns","tracking":{"current_release_date":"2024-09-27T14:01:32Z","generator":{"date":"2024-09-27T14:01:32Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:0319-1","initial_release_date":"2024-09-27T14:01:32Z","revision_history":[{"date":"2024-09-27T14:01:32Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"coredns-1.11.3-bp156.4.3.1.aarch64","product":{"name":"coredns-1.11.3-bp156.4.3.1.aarch64","product_id":"coredns-1.11.3-bp156.4.3.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"coredns-1.11.3-bp156.4.3.1.i586","product":{"name":"coredns-1.11.3-bp156.4.3.1.i586","product_id":"coredns-1.11.3-bp156.4.3.1.i586"}}],"category":"architecture","name":"i586"},{"branches":[{"category":"product_version","name":"coredns-extras-1.11.3-bp156.4.3.1.noarch","product":{"name":"coredns-extras-1.11.3-bp156.4.3.1.noarch","product_id":"coredns-extras-1.11.3-bp156.4.3.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"coredns-1.11.3-bp156.4.3.1.x86_64","product":{"name":"coredns-1.11.3-bp156.4.3.1.x86_64","product_id":"coredns-1.11.3-bp156.4.3.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Package Hub 15 SP6","product":{"name":"SUSE Package Hub 15 SP6","product_id":"SUSE Package Hub 15 SP6"}},{"category":"product_name","name":"openSUSE Leap 15.6","product":{"name":"openSUSE Leap 15.6","product_id":"openSUSE Leap 15.6","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.6"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"coredns-1.11.3-bp156.4.3.1.aarch64 as component of SUSE Package Hub 15 SP6","product_id":"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64"},"product_reference":"coredns-1.11.3-bp156.4.3.1.aarch64","relates_to_product_reference":"SUSE Package Hub 15 SP6"},{"category":"default_component_of","full_product_name":{"name":"coredns-1.11.3-bp156.4.3.1.i586 as component of SUSE Package Hub 15 SP6","product_id":"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586"},"product_reference":"coredns-1.11.3-bp156.4.3.1.i586","relates_to_product_reference":"SUSE Package Hub 15 SP6"},{"category":"default_component_of","full_product_name":{"name":"coredns-1.11.3-bp156.4.3.1.x86_64 as component of SUSE Package Hub 15 SP6","product_id":"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64"},"product_reference":"coredns-1.11.3-bp156.4.3.1.x86_64","relates_to_product_reference":"SUSE Package Hub 15 SP6"},{"category":"default_component_of","full_product_name":{"name":"coredns-extras-1.11.3-bp156.4.3.1.noarch as component of SUSE Package Hub 15 SP6","product_id":"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch"},"product_reference":"coredns-extras-1.11.3-bp156.4.3.1.noarch","relates_to_product_reference":"SUSE Package Hub 15 SP6"},{"category":"default_component_of","full_product_name":{"name":"coredns-1.11.3-bp156.4.3.1.aarch64 as component of openSUSE Leap 15.6","product_id":"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64"},"product_reference":"coredns-1.11.3-bp156.4.3.1.aarch64","relates_to_product_reference":"openSUSE Leap 15.6"},{"category":"default_component_of","full_product_name":{"name":"coredns-1.11.3-bp156.4.3.1.i586 as component of openSUSE Leap 15.6","product_id":"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586"},"product_reference":"coredns-1.11.3-bp156.4.3.1.i586","relates_to_product_reference":"openSUSE Leap 15.6"},{"category":"default_component_of","full_product_name":{"name":"coredns-1.11.3-bp156.4.3.1.x86_64 as component of openSUSE Leap 15.6","product_id":"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64"},"product_reference":"coredns-1.11.3-bp156.4.3.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.6"},{"category":"default_component_of","full_product_name":{"name":"coredns-extras-1.11.3-bp156.4.3.1.noarch as component of openSUSE Leap 15.6","product_id":"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"},"product_reference":"coredns-extras-1.11.3-bp156.4.3.1.noarch","relates_to_product_reference":"openSUSE Leap 15.6"}]},"vulnerabilities":[{"cve":"CVE-2022-27191","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-27191"}],"notes":[{"category":"general","text":"The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2022-27191","url":"https://www.suse.com/security/cve/CVE-2022-27191"},{"category":"external","summary":"SUSE Bug 1197284 for CVE-2022-27191","url":"https://bugzilla.suse.com/1197284"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"threats":[{"category":"impact","date":"2024-09-27T14:01:32Z","details":"important"}],"title":"CVE-2022-27191"},{"cve":"CVE-2022-28948","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-28948"}],"notes":[{"category":"general","text":"An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2022-28948","url":"https://www.suse.com/security/cve/CVE-2022-28948"},{"category":"external","summary":"SUSE Bug 1199772 for CVE-2022-28948","url":"https://bugzilla.suse.com/1199772"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"threats":[{"category":"impact","date":"2024-09-27T14:01:32Z","details":"moderate"}],"title":"CVE-2022-28948"},{"cve":"CVE-2023-28452","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-28452"}],"notes":[{"category":"general","text":"An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2023-28452","url":"https://www.suse.com/security/cve/CVE-2023-28452"},{"category":"external","summary":"SUSE Bug 1230760 for CVE-2023-28452","url":"https://bugzilla.suse.com/1230760"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"threats":[{"category":"impact","date":"2024-09-27T14:01:32Z","details":"important"}],"title":"CVE-2023-28452"},{"cve":"CVE-2023-30464","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-30464"}],"notes":[{"category":"general","text":"CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2023-30464","url":"https://www.suse.com/security/cve/CVE-2023-30464"},{"category":"external","summary":"SUSE Bug 1230757 for CVE-2023-30464","url":"https://bugzilla.suse.com/1230757"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"threats":[{"category":"impact","date":"2024-09-27T14:01:32Z","details":"important"}],"title":"CVE-2023-30464"},{"cve":"CVE-2024-0874","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-0874"}],"notes":[{"category":"general","text":"A flaw was found in coredns. This issue could lead to invalid cache entries returning due to incorrectly implemented caching.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2024-0874","url":"https://www.suse.com/security/cve/CVE-2024-0874"},{"category":"external","summary":"SUSE Bug 1219167 for CVE-2024-0874","url":"https://bugzilla.suse.com/1219167"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"threats":[{"category":"impact","date":"2024-09-27T14:01:32Z","details":"moderate"}],"title":"CVE-2024-0874"},{"cve":"CVE-2024-22189","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-22189"}],"notes":[{"category":"general","text":"quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2024-22189","url":"https://www.suse.com/security/cve/CVE-2024-22189"},{"category":"external","summary":"SUSE Bug 1222461 for CVE-2024-22189","url":"https://bugzilla.suse.com/1222461"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586","SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64","SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586","openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64","openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"]}],"threats":[{"category":"impact","date":"2024-09-27T14:01:32Z","details":"important"}],"title":"CVE-2024-22189"}]}