{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"dhcp-4.3.3.P1-3.1 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the dhcp-4.3.3.P1-3.1 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2024-10358","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10358-1.json"},{"category":"self","summary":"SUSE CVE CVE-2009-1892 page","url":"https://www.suse.com/security/cve/CVE-2009-1892/"},{"category":"self","summary":"SUSE CVE CVE-2010-2156 page","url":"https://www.suse.com/security/cve/CVE-2010-2156/"},{"category":"self","summary":"SUSE CVE CVE-2010-3611 page","url":"https://www.suse.com/security/cve/CVE-2010-3611/"},{"category":"self","summary":"SUSE CVE CVE-2010-3616 page","url":"https://www.suse.com/security/cve/CVE-2010-3616/"},{"category":"self","summary":"SUSE CVE CVE-2011-0413 page","url":"https://www.suse.com/security/cve/CVE-2011-0413/"},{"category":"self","summary":"SUSE CVE CVE-2011-0997 page","url":"https://www.suse.com/security/cve/CVE-2011-0997/"},{"category":"self","summary":"SUSE CVE CVE-2011-2748 page","url":"https://www.suse.com/security/cve/CVE-2011-2748/"},{"category":"self","summary":"SUSE CVE CVE-2011-2749 page","url":"https://www.suse.com/security/cve/CVE-2011-2749/"},{"category":"self","summary":"SUSE CVE CVE-2011-4539 page","url":"https://www.suse.com/security/cve/CVE-2011-4539/"},{"category":"self","summary":"SUSE CVE CVE-2011-4868 page","url":"https://www.suse.com/security/cve/CVE-2011-4868/"},{"category":"self","summary":"SUSE CVE CVE-2012-3570 page","url":"https://www.suse.com/security/cve/CVE-2012-3570/"},{"category":"self","summary":"SUSE CVE CVE-2012-3571 page","url":"https://www.suse.com/security/cve/CVE-2012-3571/"},{"category":"self","summary":"SUSE CVE CVE-2012-3954 page","url":"https://www.suse.com/security/cve/CVE-2012-3954/"},{"category":"self","summary":"SUSE CVE CVE-2012-3955 page","url":"https://www.suse.com/security/cve/CVE-2012-3955/"},{"category":"self","summary":"SUSE CVE CVE-2013-2266 page","url":"https://www.suse.com/security/cve/CVE-2013-2266/"},{"category":"self","summary":"SUSE CVE CVE-2015-8605 page","url":"https://www.suse.com/security/cve/CVE-2015-8605/"}],"title":"dhcp-4.3.3.P1-3.1 on GA media","tracking":{"current_release_date":"2024-06-15T00:00:00Z","generator":{"date":"2024-06-15T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:10358-1","initial_release_date":"2024-06-15T00:00:00Z","revision_history":[{"date":"2024-06-15T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"dhcp-4.3.3.P1-3.1.aarch64","product":{"name":"dhcp-4.3.3.P1-3.1.aarch64","product_id":"dhcp-4.3.3.P1-3.1.aarch64"}},{"category":"product_version","name":"dhcp-client-4.3.3.P1-3.1.aarch64","product":{"name":"dhcp-client-4.3.3.P1-3.1.aarch64","product_id":"dhcp-client-4.3.3.P1-3.1.aarch64"}},{"category":"product_version","name":"dhcp-devel-4.3.3.P1-3.1.aarch64","product":{"name":"dhcp-devel-4.3.3.P1-3.1.aarch64","product_id":"dhcp-devel-4.3.3.P1-3.1.aarch64"}},{"category":"product_version","name":"dhcp-doc-4.3.3.P1-3.1.aarch64","product":{"name":"dhcp-doc-4.3.3.P1-3.1.aarch64","product_id":"dhcp-doc-4.3.3.P1-3.1.aarch64"}},{"category":"product_version","name":"dhcp-relay-4.3.3.P1-3.1.aarch64","product":{"name":"dhcp-relay-4.3.3.P1-3.1.aarch64","product_id":"dhcp-relay-4.3.3.P1-3.1.aarch64"}},{"category":"product_version","name":"dhcp-server-4.3.3.P1-3.1.aarch64","product":{"name":"dhcp-server-4.3.3.P1-3.1.aarch64","product_id":"dhcp-server-4.3.3.P1-3.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"dhcp-4.3.3.P1-3.1.ppc64le","product":{"name":"dhcp-4.3.3.P1-3.1.ppc64le","product_id":"dhcp-4.3.3.P1-3.1.ppc64le"}},{"category":"product_version","name":"dhcp-client-4.3.3.P1-3.1.ppc64le","product":{"name":"dhcp-client-4.3.3.P1-3.1.ppc64le","product_id":"dhcp-client-4.3.3.P1-3.1.ppc64le"}},{"category":"product_version","name":"dhcp-devel-4.3.3.P1-3.1.ppc64le","product":{"name":"dhcp-devel-4.3.3.P1-3.1.ppc64le","product_id":"dhcp-devel-4.3.3.P1-3.1.ppc64le"}},{"category":"product_version","name":"dhcp-doc-4.3.3.P1-3.1.ppc64le","product":{"name":"dhcp-doc-4.3.3.P1-3.1.ppc64le","product_id":"dhcp-doc-4.3.3.P1-3.1.ppc64le"}},{"category":"product_version","name":"dhcp-relay-4.3.3.P1-3.1.ppc64le","product":{"name":"dhcp-relay-4.3.3.P1-3.1.ppc64le","product_id":"dhcp-relay-4.3.3.P1-3.1.ppc64le"}},{"category":"product_version","name":"dhcp-server-4.3.3.P1-3.1.ppc64le","product":{"name":"dhcp-server-4.3.3.P1-3.1.ppc64le","product_id":"dhcp-server-4.3.3.P1-3.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"dhcp-4.3.3.P1-3.1.s390x","product":{"name":"dhcp-4.3.3.P1-3.1.s390x","product_id":"dhcp-4.3.3.P1-3.1.s390x"}},{"category":"product_version","name":"dhcp-client-4.3.3.P1-3.1.s390x","product":{"name":"dhcp-client-4.3.3.P1-3.1.s390x","product_id":"dhcp-client-4.3.3.P1-3.1.s390x"}},{"category":"product_version","name":"dhcp-devel-4.3.3.P1-3.1.s390x","product":{"name":"dhcp-devel-4.3.3.P1-3.1.s390x","product_id":"dhcp-devel-4.3.3.P1-3.1.s390x"}},{"category":"product_version","name":"dhcp-doc-4.3.3.P1-3.1.s390x","product":{"name":"dhcp-doc-4.3.3.P1-3.1.s390x","product_id":"dhcp-doc-4.3.3.P1-3.1.s390x"}},{"category":"product_version","name":"dhcp-relay-4.3.3.P1-3.1.s390x","product":{"name":"dhcp-relay-4.3.3.P1-3.1.s390x","product_id":"dhcp-relay-4.3.3.P1-3.1.s390x"}},{"category":"product_version","name":"dhcp-server-4.3.3.P1-3.1.s390x","product":{"name":"dhcp-server-4.3.3.P1-3.1.s390x","product_id":"dhcp-server-4.3.3.P1-3.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"dhcp-4.3.3.P1-3.1.x86_64","product":{"name":"dhcp-4.3.3.P1-3.1.x86_64","product_id":"dhcp-4.3.3.P1-3.1.x86_64"}},{"category":"product_version","name":"dhcp-client-4.3.3.P1-3.1.x86_64","product":{"name":"dhcp-client-4.3.3.P1-3.1.x86_64","product_id":"dhcp-client-4.3.3.P1-3.1.x86_64"}},{"category":"product_version","name":"dhcp-devel-4.3.3.P1-3.1.x86_64","product":{"name":"dhcp-devel-4.3.3.P1-3.1.x86_64","product_id":"dhcp-devel-4.3.3.P1-3.1.x86_64"}},{"category":"product_version","name":"dhcp-doc-4.3.3.P1-3.1.x86_64","product":{"name":"dhcp-doc-4.3.3.P1-3.1.x86_64","product_id":"dhcp-doc-4.3.3.P1-3.1.x86_64"}},{"category":"product_version","name":"dhcp-relay-4.3.3.P1-3.1.x86_64","product":{"name":"dhcp-relay-4.3.3.P1-3.1.x86_64","product_id":"dhcp-relay-4.3.3.P1-3.1.x86_64"}},{"category":"product_version","name":"dhcp-server-4.3.3.P1-3.1.x86_64","product":{"name":"dhcp-server-4.3.3.P1-3.1.x86_64","product_id":"dhcp-server-4.3.3.P1-3.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"dhcp-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64"},"product_reference":"dhcp-4.3.3.P1-3.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le"},"product_reference":"dhcp-4.3.3.P1-3.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x"},"product_reference":"dhcp-4.3.3.P1-3.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64"},"product_reference":"dhcp-4.3.3.P1-3.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-client-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64"},"product_reference":"dhcp-client-4.3.3.P1-3.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-client-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le"},"product_reference":"dhcp-client-4.3.3.P1-3.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-client-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x"},"product_reference":"dhcp-client-4.3.3.P1-3.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-client-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64"},"product_reference":"dhcp-client-4.3.3.P1-3.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-devel-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64"},"product_reference":"dhcp-devel-4.3.3.P1-3.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-devel-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le"},"product_reference":"dhcp-devel-4.3.3.P1-3.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-devel-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x"},"product_reference":"dhcp-devel-4.3.3.P1-3.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-devel-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64"},"product_reference":"dhcp-devel-4.3.3.P1-3.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-doc-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64"},"product_reference":"dhcp-doc-4.3.3.P1-3.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-doc-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le"},"product_reference":"dhcp-doc-4.3.3.P1-3.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-doc-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x"},"product_reference":"dhcp-doc-4.3.3.P1-3.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-doc-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64"},"product_reference":"dhcp-doc-4.3.3.P1-3.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-relay-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64"},"product_reference":"dhcp-relay-4.3.3.P1-3.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-relay-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le"},"product_reference":"dhcp-relay-4.3.3.P1-3.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-relay-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x"},"product_reference":"dhcp-relay-4.3.3.P1-3.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-relay-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64"},"product_reference":"dhcp-relay-4.3.3.P1-3.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-server-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64"},"product_reference":"dhcp-server-4.3.3.P1-3.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-server-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le"},"product_reference":"dhcp-server-4.3.3.P1-3.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-server-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x"},"product_reference":"dhcp-server-4.3.3.P1-3.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"dhcp-server-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"},"product_reference":"dhcp-server-4.3.3.P1-3.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2009-1892","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2009-1892"}],"notes":[{"category":"general","text":"dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2009-1892","url":"https://www.suse.com/security/cve/CVE-2009-1892"},{"category":"external","summary":"SUSE Bug 519413 for CVE-2009-1892","url":"https://bugzilla.suse.com/519413"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2009-1892"},{"cve":"CVE-2010-2156","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2010-2156"}],"notes":[{"category":"general","text":"ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2010-2156","url":"https://www.suse.com/security/cve/CVE-2010-2156"},{"category":"external","summary":"SUSE Bug 612546 for CVE-2010-2156","url":"https://bugzilla.suse.com/612546"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2010-2156"},{"cve":"CVE-2010-3611","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2010-3611"}],"notes":[{"category":"general","text":"ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2010-3611","url":"https://www.suse.com/security/cve/CVE-2010-3611"},{"category":"external","summary":"SUSE Bug 650902 for CVE-2010-3611","url":"https://bugzilla.suse.com/650902"},{"category":"external","summary":"SUSE Bug 667655 for CVE-2010-3611","url":"https://bugzilla.suse.com/667655"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2010-3611"},{"cve":"CVE-2010-3616","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2010-3616"}],"notes":[{"category":"general","text":"ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2010-3616","url":"https://www.suse.com/security/cve/CVE-2010-3616"},{"category":"external","summary":"SUSE Bug 659059 for CVE-2010-3616","url":"https://bugzilla.suse.com/659059"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2010-3616"},{"cve":"CVE-2011-0413","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-0413"}],"notes":[{"category":"general","text":"The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-0413","url":"https://www.suse.com/security/cve/CVE-2011-0413"},{"category":"external","summary":"SUSE Bug 667655 for CVE-2011-0413","url":"https://bugzilla.suse.com/667655"},{"category":"external","summary":"SUSE Bug 680298 for CVE-2011-0413","url":"https://bugzilla.suse.com/680298"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2011-0413"},{"cve":"CVE-2011-0997","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-0997"}],"notes":[{"category":"general","text":"dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-0997","url":"https://www.suse.com/security/cve/CVE-2011-0997"},{"category":"external","summary":"SUSE Bug 675052 for CVE-2011-0997","url":"https://bugzilla.suse.com/675052"},{"category":"external","summary":"SUSE Bug 689182 for CVE-2011-0997","url":"https://bugzilla.suse.com/689182"},{"category":"external","summary":"SUSE Bug 708527 for CVE-2011-0997","url":"https://bugzilla.suse.com/708527"},{"category":"external","summary":"SUSE Bug 715172 for CVE-2011-0997","url":"https://bugzilla.suse.com/715172"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2011-0997"},{"cve":"CVE-2011-2748","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-2748"}],"notes":[{"category":"general","text":"The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-2748","url":"https://www.suse.com/security/cve/CVE-2011-2748"},{"category":"external","summary":"SUSE Bug 712653 for CVE-2011-2748","url":"https://bugzilla.suse.com/712653"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2011-2748"},{"cve":"CVE-2011-2749","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-2749"}],"notes":[{"category":"general","text":"The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-2749","url":"https://www.suse.com/security/cve/CVE-2011-2749"},{"category":"external","summary":"SUSE Bug 712653 for CVE-2011-2749","url":"https://bugzilla.suse.com/712653"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2011-2749"},{"cve":"CVE-2011-4539","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-4539"}],"notes":[{"category":"general","text":"dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-4539","url":"https://www.suse.com/security/cve/CVE-2011-4539"},{"category":"external","summary":"SUSE Bug 735610 for CVE-2011-4539","url":"https://bugzilla.suse.com/735610"},{"category":"external","summary":"SUSE Bug 741239 for CVE-2011-4539","url":"https://bugzilla.suse.com/741239"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2011-4539"},{"cve":"CVE-2011-4868","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-4868"}],"notes":[{"category":"general","text":"The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-4868","url":"https://www.suse.com/security/cve/CVE-2011-4868"},{"category":"external","summary":"SUSE Bug 741239 for CVE-2011-4868","url":"https://bugzilla.suse.com/741239"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2011-4868"},{"cve":"CVE-2012-3570","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2012-3570"}],"notes":[{"category":"general","text":"Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2012-3570","url":"https://www.suse.com/security/cve/CVE-2012-3570"},{"category":"external","summary":"SUSE Bug 772924 for CVE-2012-3570","url":"https://bugzilla.suse.com/772924"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2012-3570"},{"cve":"CVE-2012-3571","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2012-3571"}],"notes":[{"category":"general","text":"ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2012-3571","url":"https://www.suse.com/security/cve/CVE-2012-3571"},{"category":"external","summary":"SUSE Bug 772924 for CVE-2012-3571","url":"https://bugzilla.suse.com/772924"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2012-3571"},{"cve":"CVE-2012-3954","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2012-3954"}],"notes":[{"category":"general","text":"Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2012-3954","url":"https://www.suse.com/security/cve/CVE-2012-3954"},{"category":"external","summary":"SUSE Bug 772924 for CVE-2012-3954","url":"https://bugzilla.suse.com/772924"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2012-3954"},{"cve":"CVE-2012-3955","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2012-3955"}],"notes":[{"category":"general","text":"ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2012-3955","url":"https://www.suse.com/security/cve/CVE-2012-3955"},{"category":"external","summary":"SUSE Bug 780167 for CVE-2012-3955","url":"https://bugzilla.suse.com/780167"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2012-3955"},{"cve":"CVE-2013-2266","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2013-2266"}],"notes":[{"category":"general","text":"libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2013-2266","url":"https://www.suse.com/security/cve/CVE-2013-2266"},{"category":"external","summary":"SUSE Bug 811876 for CVE-2013-2266","url":"https://bugzilla.suse.com/811876"},{"category":"external","summary":"SUSE Bug 811934 for CVE-2013-2266","url":"https://bugzilla.suse.com/811934"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2013-2266"},{"cve":"CVE-2015-8605","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-8605"}],"notes":[{"category":"general","text":"ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-8605","url":"https://www.suse.com/security/cve/CVE-2015-8605"},{"category":"external","summary":"SUSE Bug 961305 for CVE-2015-8605","url":"https://bugzilla.suse.com/961305"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x","openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-8605"}]}