Action not permitted
Modal body text goes here.
cve-2022-2928
Vulnerability from cvelistv5
Published
2022-10-07 04:45
Modified
2024-09-17 00:21
Severity ?
EPSS score ?
Summary
An option refcount overflow exists in dhcpd
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:53:00.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://kb.isc.org/docs/cve-2022-2928" }, { "name": "[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00015.html" }, { "name": "FEDORA-2022-f5a45757df", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQXYCIWUDILRCNBAIMVFCSGXBRKEPB4K/" }, { "name": "FEDORA-2022-9ca9a94e28", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T6IBFH4MRRNJQVWEKILQ6I6CXWW766FX/" }, { "name": "FEDORA-2022-c4f274a54f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SARIK7KZ7MGQIWDRWZFAOSQSPXY4GOU/" }, { "name": "GLSA-202305-22", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-22" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ISC DHCP", "vendor": "ISC", "versions": [ { "status": "affected", "version": "4.4.0 through versions before 4.4.3-P1" }, { "status": "affected", "version": "4.1 ESV 4.1-ESV-R1 through versions before 4.1-ESV-R16-P1" } ] } ], "credits": [ { "lang": "en", "value": "ISC would like to thank VictorV of Cyber Kunlun Lab for discovering and reporting this issue." } ], "datePublic": "2022-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort." } ], "exploits": [ { "lang": "en", "value": "We are not aware of any active exploits." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "A DHCP server configured with allow leasequery;, a remote machine with access to the server can send lease queries for the same lease multiple times, leading to the add_option() function being repeatedly called. This could cause an option\u0027s refcount field to overflow and the server to abort. Internally, reference counters are integers and thus overflow at 2^31 references, so even at 1000 lease query responses per second, it would take more than three weeks to crash the server. Affects In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-03T00:00:00", "orgId": "404fd4d2-a609-4245-b543-2c944a302a22", "shortName": "isc" }, "references": [ { "url": "https://kb.isc.org/docs/cve-2022-2928" }, { "name": "[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00015.html" }, { "name": "FEDORA-2022-f5a45757df", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQXYCIWUDILRCNBAIMVFCSGXBRKEPB4K/" }, { "name": "FEDORA-2022-9ca9a94e28", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T6IBFH4MRRNJQVWEKILQ6I6CXWW766FX/" }, { "name": "FEDORA-2022-c4f274a54f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SARIK7KZ7MGQIWDRWZFAOSQSPXY4GOU/" }, { "name": "GLSA-202305-22", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-22" } ], "solutions": [ { "lang": "en", "value": "Upgrade to the patched release most closely related to your current version of ISC DHCP. These can all be downloaded from https://www.isc.org/downloads. 4.4.3-P1 4.1-ESV-R16-P2" } ], "source": { "discovery": "EXTERNAL" }, "title": "An option refcount overflow exists in dhcpd", "workarounds": [ { "lang": "en", "value": "Disable lease query on the server for DHCPv4 or restart the server periodically." } ] } }, "cveMetadata": { "assignerOrgId": "404fd4d2-a609-4245-b543-2c944a302a22", "assignerShortName": "isc", "cveId": "CVE-2022-2928", "datePublished": "2022-10-07T04:45:11.751554Z", "dateReserved": "2022-08-22T00:00:00", "dateUpdated": "2024-09-17T00:21:40.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-2928\",\"sourceIdentifier\":\"security-officer@isc.org\",\"published\":\"2022-10-07T05:15:08.677\",\"lastModified\":\"2023-11-07T03:47:05.293\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.\"},{\"lang\":\"es\",\"value\":\"En ISC DHCP versiones 4.4.0 anteriores a 4.4.3, ISC DHCP versiones 4.1-ESV-R1 anteriores a 4.1-ESV-R16-P1, cuando la funci\u00f3n option_code_hash_lookup() es llamada desde add_option(), incrementa el campo refcount de la opci\u00f3n. Sin embargo, no se presenta una llamada correspondiente a option_dereference() para disminuir el campo refcount. La funci\u00f3n add_option() s\u00f3lo es usada en las respuestas del servidor a paquetes de consulta de arrendamiento. Cada respuesta de consulta de arrendamiento llama a esta funci\u00f3n para varias opciones, por lo que eventualmente, los contadores de referencia podr\u00edan desbordarse y causar a el servidor abortar\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-officer@isc.org\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.0\",\"versionEndIncluding\":\"4.4.3\",\"matchCriteriaId\":\"82DF9AAC-429A-43EB-83EF-0FEFBB95BF26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBAABA4E-0D34-4644-AC26-E272CEE6C361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*\",\"matchCriteriaId\":\"179443DC-4B6A-408A-8BE5-B3E72188F43E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BE7736-58CD-468B-84AB-B38C9B254BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB6F7F0-B2A0-47E3-AD7A-4E7618A36F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r10b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA5FAE54-1645-4A38-A431-10E67304399A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r10rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0D1A71-CECB-4C86-87F6-EB3741BDF692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF80D19-3B0A-4A74-944E-F33CCC30EADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"40B21FCB-43A8-4266-934D-ECFF8138F637\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D49F23-9074-49E7-985F-4D93393324CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F729D1D-7234-4BC2-839B-AE1BB9D16C25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r11b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E01D88D-876D-45FE-B7ED-089DAD801EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r11rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B030B1-F008-4562-93C7-7E1C6D3D00F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r11rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF656F5E-B317-4E0C-BF01-EC2A917142DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBA64EEC-C0C7-4F11-8131-2868691E54DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r12-p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFD3109A-1D76-4EA7-BF39-0B203AD945CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"157520D7-AE39-4E23-A8CF-DD75EA78C055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07118EC-9508-42B8-8D09-5CE310DA2B43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r12b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2156D1BC-90AE-4AF3-964C-DAC7DCE14A5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*\",\"matchCriteriaId\":\"A157E664-6ACE-44CE-AC07-64898B182EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0056BF7A-4A70-4F1D-89C2-25CCDB65217B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r13b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA8ADA07-94FA-4014-AF70-8FCAF5F0DB03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D21F05D-246F-41F5-81FD-286C26168E2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"12103C87-C942-481A-A68C-7BC83F964C06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r14b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E0124D-6330-4013-8145-4309FDAE60A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*\",\"matchCriteriaId\":\"924E91FF-495F-4963-827F-57F7340C6560\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r15-p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC02748-557A-4131-A372-D99B62B4B93B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r15_b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"76A11284-3D81-45F0-8055-17282945C14F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r16:*:*:*:*:*:*\",\"matchCriteriaId\":\"98431CF5-D4C2-4FCF-BA81-0BBB631546D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:r16-p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA9F857-B59F-4D2D-8F7B-0D1BF08E9712\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}]}]}],\"references\":[{\"url\":\"https://kb.isc.org/docs/cve-2022-2928\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00015.html\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SARIK7KZ7MGQIWDRWZFAOSQSPXY4GOU/\",\"source\":\"security-officer@isc.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQXYCIWUDILRCNBAIMVFCSGXBRKEPB4K/\",\"source\":\"security-officer@isc.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T6IBFH4MRRNJQVWEKILQ6I6CXWW766FX/\",\"source\":\"security-officer@isc.org\"},{\"url\":\"https://security.gentoo.org/glsa/202305-22\",\"source\":\"security-officer@isc.org\"}]}}" } }
wid-sec-w-2023-1424
Vulnerability from csaf_certbund
Published
2023-06-12 22:00
Modified
2023-06-12 22:00
Summary
Xerox FreeFlow Print Server für Solaris: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.
Betroffene Betriebssysteme
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1424 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1424.json" }, { "category": "self", "summary": "WID-SEC-2023-1424 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1424" }, { "category": "external", "summary": "Xerox Security Bulletin vom 2023-06-12", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/06/Xerox-Security-Bulletin-XRX23-009-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server f\u00fcr Solaris: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-12T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:52:15.756+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1424", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server v9 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v9 for Solaris", "product_id": "T028053", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris" } } } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-28176", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-28176" }, { "cve": "CVE-2023-28164", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-28164" }, { "cve": "CVE-2023-28163", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-28163" }, { "cve": "CVE-2023-28162", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-28162" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-25752", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25752" }, { "cve": "CVE-2023-25751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25751" }, { "cve": "CVE-2023-25746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25746" }, { "cve": "CVE-2023-25744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25744" }, { "cve": "CVE-2023-25743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25743" }, { "cve": "CVE-2023-25742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25742" }, { "cve": "CVE-2023-25739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25739" }, { "cve": "CVE-2023-25738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25738" }, { "cve": "CVE-2023-25737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25737" }, { "cve": "CVE-2023-25735", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25735" }, { "cve": "CVE-2023-25734", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25734" }, { "cve": "CVE-2023-25732", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25732" }, { "cve": "CVE-2023-25730", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25730" }, { "cve": "CVE-2023-25729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25729" }, { "cve": "CVE-2023-25728", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25728" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-24807", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-24807" }, { "cve": "CVE-2023-24580", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-24580" }, { "cve": "CVE-2023-23969", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23969" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-23936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23936" }, { "cve": "CVE-2023-23920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23920" }, { "cve": "CVE-2023-23919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23919" }, { "cve": "CVE-2023-23918", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23918" }, { "cve": "CVE-2023-23605", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23605" }, { "cve": "CVE-2023-23603", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23603" }, { "cve": "CVE-2023-23602", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23602" }, { "cve": "CVE-2023-23601", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23601" }, { "cve": "CVE-2023-23599", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23599" }, { "cve": "CVE-2023-23598", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23598" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-22003", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-22003" }, { "cve": "CVE-2023-21985", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-21985" }, { "cve": "CVE-2023-21984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-21984" }, { "cve": "CVE-2023-21928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-21928" }, { "cve": "CVE-2023-21896", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-21896" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21840", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-21840" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-0804", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0804" }, { "cve": "CVE-2023-0803", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0803" }, { "cve": "CVE-2023-0802", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0802" }, { "cve": "CVE-2023-0801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0801" }, { "cve": "CVE-2023-0800", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0800" }, { "cve": "CVE-2023-0799", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0799" }, { "cve": "CVE-2023-0798", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0798" }, { "cve": "CVE-2023-0797", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0797" }, { "cve": "CVE-2023-0796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0796" }, { "cve": "CVE-2023-0795", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0795" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-0662", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0662" }, { "cve": "CVE-2023-0616", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0616" }, { "cve": "CVE-2023-0568", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0568" }, { "cve": "CVE-2023-0567", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0567" }, { "cve": "CVE-2023-0430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0430" }, { "cve": "CVE-2023-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0417" }, { "cve": "CVE-2023-0416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0416" }, { "cve": "CVE-2023-0415", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0415" }, { "cve": "CVE-2023-0414", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0414" }, { "cve": "CVE-2023-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0413" }, { "cve": "CVE-2023-0412", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0412" }, { "cve": "CVE-2023-0411", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0411" }, { "cve": "CVE-2023-0401", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0401" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0217" }, { "cve": "CVE-2023-0216", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0216" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-46877", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-46877" }, { "cve": "CVE-2022-46874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-46874" }, { "cve": "CVE-2022-46871", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-46871" }, { "cve": "CVE-2022-46344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-46344" }, { "cve": "CVE-2022-46343", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-46343" }, { "cve": "CVE-2022-46342", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-46342" }, { "cve": "CVE-2022-46341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-46341" }, { "cve": "CVE-2022-46340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-46340" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-45199", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-45199" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-4345", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4345" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42919" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4283", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4283" }, { "cve": "CVE-2022-4203", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4203" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-40898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-40898" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-39253", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-39253" }, { "cve": "CVE-2022-3924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3924" }, { "cve": "CVE-2022-38784", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-38784" }, { "cve": "CVE-2022-38171", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-38171" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-3736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3736" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-36114", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-36114" }, { "cve": "CVE-2022-36113", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-36113" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3256", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3256" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32190" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-2929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2929" }, { "cve": "CVE-2022-2928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2928" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-28331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-28331" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27337", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-27337" }, { "cve": "CVE-2022-25255", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-25255" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-24963", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-24963" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-21515", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-21515" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1122", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1122" }, { "cve": "CVE-2022-0718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-0718" }, { "cve": "CVE-2021-37750", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-37750" }, { "cve": "CVE-2021-37519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-37519" }, { "cve": "CVE-2021-35940", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-35940" }, { "cve": "CVE-2021-30860", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-30860" }, { "cve": "CVE-2021-29338", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-29338" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2018-25032" }, { "cve": "CVE-2017-12613", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2017-12613" }, { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2006-20001" } ] }
wid-sec-w-2022-1634
Vulnerability from csaf_certbund
Published
2022-10-05 22:00
Modified
2023-07-23 22:00
Summary
Internet Systems Consortium DHCP: Mehrere Schwachstellen ermöglichen Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Internet Systems Consortium (ISC) DHCP ist eine weit verbreitete Client- und Server-Implementierung des Dynamic Host Configuration Protokolls (DHCP) unter Unix. Sie ermöglicht die automatische Verteilung von IP-Informationen, wie z. B. IP-Adresse, Netzwerkmaske, Defaultgateway vom Server zu Clients.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium DHCP ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Internet Systems Consortium (ISC) DHCP ist eine weit verbreitete Client- und Server-Implementierung des Dynamic Host Configuration Protokolls (DHCP) unter Unix. Sie erm\u00f6glicht die automatische Verteilung von IP-Informationen, wie z. B. IP-Adresse, Netzwerkmaske, Defaultgateway vom Server zu Clients.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium DHCP ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1634 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1634.json" }, { "category": "self", "summary": "WID-SEC-2022-1634 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1634" }, { "category": "external", "summary": "Dell Security Advisory DSA-2023-069 vom 2023-07-21", "url": "https://www.dell.com/support/kbdoc/de-de/000210964/dsa-2023-069-dell-networker-vproxy-security-update-for-multiple-vulnerabilities-detected-on-vproxy-4-3-0-38" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-3000 vom 2023-05-24", "url": "https://linux.oracle.com/errata/ELSA-2023-3000.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202305-22 vom 2023-05-21", "url": "https://security.gentoo.org/glsa/202305-22" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3000 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:3000" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2502 vom 2023-05-09", "url": "https://access.redhat.com/errata/RHSA-2023:2502" }, { "category": "external", "summary": "Sophos UTM Up2date 9.715 vom 2023-03-13", "url": "https://community.sophos.com/utm-firewall/b/blog/posts/utm-up2date-9-715-released" }, { "category": "external", "summary": "ISC Security Advisory vom 2022-10-05", "url": "https://kb.isc.org/docs/cve-2022-2928" }, { "category": "external", "summary": "ISC Security Advisory vom 2022-10-05", "url": "https://kb.isc.org/docs/cve-2022-2929" }, { "category": "external", "summary": "Debian Security Advisory DSA-5251 vom 2022-10-06", "url": "https://lists.debian.org/debian-security-announce/2022/msg00220.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2022-9CA9A94E28 vom 2022-10-11", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2022-9ca9a94e28" }, { "category": "external", "summary": "Debian Security Advisory DLA-3146 vom 2022-10-11", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00015.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5658-2 vom 2022-11-07", "url": "https://ubuntu.com/security/notices/USN-5658-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1874 vom 2022-11-09", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1874.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3992-1 vom 2022-11-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012927.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3991-1 vom 2022-11-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012925.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5658-3 vom 2022-11-21", "url": "https://www.cybersecurity-help.cz/vdb/SB2022112119" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5658-3 vom 2022-11-21", "url": "https://ubuntu.com/security/notices/USN-5658-3" } ], "source_lang": "en-US", "title": "Internet Systems Consortium DHCP: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2023-07-23T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:36:07.274+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1634", "initial_release_date": "2022-10-05T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-05T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-06T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2022-10-11T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-12T22:00:00.000+00:00", "number": "5", "summary": "Referenz(en) aufgenommen: FEDORA-2022-F5A45757DF, FEDORA-2022-C4F274A54F" }, { "date": "2022-11-07T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-11-09T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-11-21T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-03-13T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates aufgenommen" }, { "date": "2023-05-09T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-16T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-21T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-07-23T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "15" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell NetWorker vProxy \u003c 4.3.0-40", "product": { "name": "Dell NetWorker vProxy \u003c 4.3.0-40", "product_id": "T028847", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:vproxy__4.3.0-40" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Infoblox NIOS \u003c 8.6.3", "product": { "name": "Infoblox NIOS \u003c 8.6.3", "product_id": "T024812", "product_identification_helper": { "cpe": "cpe:/o:infoblox:nios:8.6.3" } } } ], "category": "vendor", "name": "Infoblox" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Internet Systems Consortium DHCP \u003c 4.4.3-P1", "product": { "name": "Internet Systems Consortium DHCP \u003c 4.4.3-P1", "product_id": "T024809", "product_identification_helper": { "cpe": "cpe:/a:isc:dhcp:4.4.3-p1" } } }, { "category": "product_name", "name": "Internet Systems Consortium DHCP \u003c 4.1-ESV-R16-P2", "product": { "name": "Internet Systems Consortium DHCP \u003c 4.1-ESV-R16-P2", "product_id": "T024810", "product_identification_helper": { "cpe": "cpe:/a:isc:dhcp:4.1-esv-r16-p2" } } } ], "category": "product_name", "name": "DHCP" } ], "category": "vendor", "name": "Internet Systems Consortium" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Sophos Unified Threat Management (UTM) Software 9.7 MR15", "product": { "name": "Sophos Unified Threat Management (UTM) Software 9.7 MR15", "product_id": "T026721", "product_identification_helper": { "cpe": "cpe:/a:sophos:unified_threat_management_software:9.7_mr15" } } } ], "category": "vendor", "name": "Sophos" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } }, { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T016400", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2928", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Internet Systems Consortium DHCP. Diese besteht aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Lease-Anfragen durch den DHCP-Server. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T028847", "T026721", "398363", "T012167", "T004914", "T016400" ] }, "release_date": "2022-10-05T22:00:00.000+00:00", "title": "CVE-2022-2928" }, { "cve": "CVE-2022-2929", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Internet Systems Consortium DHCP. Bei der Verarbeitung von DHCP-Paketen mit DNS-Bezeichnungen kommt es in der qdn_universe_decode() Funktion unter bestimmten Umst\u00e4nden zu einem Speicherfehler. Ein Angreifer aus dem Angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T028847", "T026721", "398363", "T012167", "T004914", "T016400" ] }, "release_date": "2022-10-05T22:00:00.000+00:00", "title": "CVE-2022-2929" } ] }
rhsa-2023_3000
Vulnerability from csaf_redhat
Published
2023-05-16 08:42
Modified
2024-09-16 09:36
Summary
Red Hat Security Advisory: dhcp security and bug fix update
Notes
Topic
An update for dhcp is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort (CVE-2022-2928)
* dhcp: DHCP memory leak (CVE-2022-2929)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dhcp is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.\n\nSecurity Fix(es):\n\n* dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort (CVE-2022-2928)\n\n* dhcp: DHCP memory leak (CVE-2022-2929)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3000", "url": "https://access.redhat.com/errata/RHSA-2023:3000" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index" }, { "category": "external", "summary": "2132001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132001" }, { "category": "external", "summary": "2132002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132002" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_3000.json" } ], "title": "Red Hat Security Advisory: dhcp security and bug fix update", "tracking": { "current_release_date": "2024-09-16T09:36:37+00:00", "generator": { "date": "2024-09-16T09:36:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2023:3000", "initial_release_date": "2023-05-16T08:42:24+00:00", "revision_history": [ { "date": "2023-05-16T08:42:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-16T08:42:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-16T09:36:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dhcp-12:4.3.6-49.el8.src", "product": { "name": "dhcp-12:4.3.6-49.el8.src", "product_id": "dhcp-12:4.3.6-49.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@4.3.6-49.el8?arch=src\u0026epoch=12" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dhcp-client-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-client-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-client-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-libs-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-libs-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-libs-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-relay-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-relay-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-server-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-server-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debugsource-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-debugsource-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-debugsource-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debugsource@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client-debuginfo@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs-debuginfo@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay-debuginfo@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "product": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "product_id": "dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server-debuginfo@4.3.6-49.el8?arch=aarch64\u0026epoch=12" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dhcp-client-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-client-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-client-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-libs-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-libs-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-libs-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-relay-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-relay-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-server-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-server-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debugsource@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client-debuginfo@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs-debuginfo@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay-debuginfo@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "product": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "product_id": "dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server-debuginfo@4.3.6-49.el8?arch=ppc64le\u0026epoch=12" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dhcp-client-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-client-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-client-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-libs-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-libs-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-libs-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-relay-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-relay-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-server-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-server-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debugsource-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-debugsource-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-debugsource-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debugsource@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client-debuginfo@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs-debuginfo@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay-debuginfo@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64", "product": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64", "product_id": "dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server-debuginfo@4.3.6-49.el8?arch=x86_64\u0026epoch=12" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dhcp-libs-12:4.3.6-49.el8.i686", "product": { "name": "dhcp-libs-12:4.3.6-49.el8.i686", "product_id": "dhcp-libs-12:4.3.6-49.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs@4.3.6-49.el8?arch=i686\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debugsource-12:4.3.6-49.el8.i686", "product": { "name": "dhcp-debugsource-12:4.3.6-49.el8.i686", "product_id": "dhcp-debugsource-12:4.3.6-49.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debugsource@4.3.6-49.el8?arch=i686\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "product": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "product_id": "dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client-debuginfo@4.3.6-49.el8?arch=i686\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:4.3.6-49.el8.i686", "product": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.i686", "product_id": "dhcp-debuginfo-12:4.3.6-49.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.3.6-49.el8?arch=i686\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "product": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "product_id": "dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs-debuginfo@4.3.6-49.el8?arch=i686\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "product": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "product_id": "dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay-debuginfo@4.3.6-49.el8?arch=i686\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "product": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "product_id": "dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server-debuginfo@4.3.6-49.el8?arch=i686\u0026epoch=12" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "dhcp-client-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-client-12:4.3.6-49.el8.s390x", "product_id": "dhcp-client-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-libs-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-libs-12:4.3.6-49.el8.s390x", "product_id": "dhcp-libs-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-relay-12:4.3.6-49.el8.s390x", "product_id": "dhcp-relay-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-server-12:4.3.6-49.el8.s390x", "product_id": "dhcp-server-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debugsource-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-debugsource-12:4.3.6-49.el8.s390x", "product_id": "dhcp-debugsource-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debugsource@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "product_id": "dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client-debuginfo@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.s390x", "product_id": "dhcp-debuginfo-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "product_id": "dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-libs-debuginfo@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "product_id": "dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay-debuginfo@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "product": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "product_id": "dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server-debuginfo@4.3.6-49.el8?arch=s390x\u0026epoch=12" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dhcp-common-12:4.3.6-49.el8.noarch", "product": { "name": "dhcp-common-12:4.3.6-49.el8.noarch", "product_id": "dhcp-common-12:4.3.6-49.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-common@4.3.6-49.el8?arch=noarch\u0026epoch=12" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.3.6-49.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-12:4.3.6-49.el8.src" }, "product_reference": "dhcp-12:4.3.6-49.el8.src", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-client-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-client-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-client-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-client-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.i686" }, "product_reference": "dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-common-12:4.3.6-49.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-common-12:4.3.6-49.el8.noarch" }, "product_reference": "dhcp-common-12:4.3.6-49.el8.noarch", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.i686" }, "product_reference": "dhcp-debuginfo-12:4.3.6-49.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-debuginfo-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debugsource-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-debugsource-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debugsource-12:4.3.6-49.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.i686" }, "product_reference": "dhcp-debugsource-12:4.3.6-49.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debugsource-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debugsource-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-debugsource-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debugsource-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-debugsource-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-libs-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-12:4.3.6-49.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.i686" }, "product_reference": "dhcp-libs-12:4.3.6-49.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-libs-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-libs-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-libs-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.i686" }, "product_reference": "dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-relay-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-relay-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-relay-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-relay-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.i686" }, "product_reference": "dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-server-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-server-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-server-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-server-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64" }, "product_reference": "dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.i686" }, "product_reference": "dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le" }, "product_reference": "dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.s390x" }, "product_reference": "dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64" }, "product_reference": "dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "VictorV" ], "organization": "Cyber Kunlun Lab", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-2928", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132002" } ], "notes": [ { "category": "description", "text": "An integer overflow vulnerability was found in the DHCP server. When the \"option_code_hash_lookup()\" function is called from \"add_option()\", it increases the option\u0027s \"refcount\" field. However, there is not a corresponding call to \"option_dereference()\" to decrement the \"refcount\" field. The \"add_option()\" function is only used in server responses to lease query packets. Each lease query response calls this function for several options. Hence, a DHCP server configured with \"allow lease query,\" a remote machine with access to the server, can send lease queries for the same lease multiple times, leading to the \"add_option()\" function being called repeatedly. This issue could cause the reference counters to overflow and the server to abort or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort", "title": "Vulnerability summary" }, { "category": "other", "text": "Vulnerable servers are network accessible to an attacker and configured to allow and process lease queries.\n\nInternally, reference counters are integers and thus overflow at 2^31 references, so even at 1000 lease query responses per second, it would take more than three weeks to crash the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.GA:dhcp-12:4.3.6-49.el8.src", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-common-12:4.3.6-49.el8.noarch", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2928" }, { "category": "external", "summary": "RHBZ#2132002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2928", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2928" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2928", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2928" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-2928", "url": "https://kb.isc.org/docs/cve-2022-2928" } ], "release_date": "2022-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.GA:dhcp-12:4.3.6-49.el8.src", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-common-12:4.3.6-49.el8.noarch", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3000" }, { "category": "workaround", "details": "Possible workaround - Disable lease query on the server for DHCPv4 or restart the server periodically.", "product_ids": [ "BaseOS-8.8.0.GA:dhcp-12:4.3.6-49.el8.src", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-common-12:4.3.6-49.el8.noarch", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.GA:dhcp-12:4.3.6-49.el8.src", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-common-12:4.3.6-49.el8.noarch", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort" }, { "acknowledgments": [ { "names": [ "VictorV" ], "organization": "Cyber Kunlun Lab", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-2929", "discovery_date": "2022-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132001" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the DHCP server where the \"fqdn_universe_decode()\" function allocates buffer space for the contents of option 81 (fqdn) data received in a DHCP packet. The maximum length of a DNS \"label\" is 63 bytes. The function tests the length byte of each label contained in the \"fqdn\"; if it finds a label whose length byte value is larger than 63, it returns without dereferencing the buffer space. This issue causes a memory leak. On a system with access to a DHCP server, an attacker from any adjacent network could send DHCP packets crafted to include \"fqdn\" labels longer than 63 bytes to the DHCP server, eventually causing the server to run out of memory and crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhcp: DHCP memory leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.GA:dhcp-12:4.3.6-49.el8.src", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-common-12:4.3.6-49.el8.noarch", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2929" }, { "category": "external", "summary": "RHBZ#2132001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2929", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2929" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-2929", "url": "https://kb.isc.org/docs/cve-2022-2929" } ], "release_date": "2022-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.GA:dhcp-12:4.3.6-49.el8.src", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-common-12:4.3.6-49.el8.noarch", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3000" }, { "category": "workaround", "details": "Possible workaround - As exploiting this vulnerability requires an attacker to send packets for an extended period of time, restarting servers periodically could be a viable workaround.", "product_ids": [ "BaseOS-8.8.0.GA:dhcp-12:4.3.6-49.el8.src", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-common-12:4.3.6-49.el8.noarch", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.GA:dhcp-12:4.3.6-49.el8.src", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-client-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-common-12:4.3.6-49.el8.noarch", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-debugsource-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-libs-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-relay-debuginfo-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-12:4.3.6-49.el8.x86_64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.aarch64", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.i686", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.ppc64le", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.s390x", "BaseOS-8.8.0.GA:dhcp-server-debuginfo-12:4.3.6-49.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dhcp: DHCP memory leak" } ] }
rhsa-2023_2502
Vulnerability from csaf_redhat
Published
2023-05-09 09:51
Modified
2024-09-16 09:36
Summary
Red Hat Security Advisory: dhcp security and enhancement update
Notes
Topic
An update for dhcp is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort (CVE-2022-2928)
* dhcp: DHCP memory leak (CVE-2022-2929)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dhcp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.\n\nSecurity Fix(es):\n\n* dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort (CVE-2022-2928)\n\n* dhcp: DHCP memory leak (CVE-2022-2929)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:2502", "url": "https://access.redhat.com/errata/RHSA-2023:2502" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index" }, { "category": "external", "summary": "2095396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095396" }, { "category": "external", "summary": "2132001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132001" }, { "category": "external", "summary": "2132002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132002" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_2502.json" } ], "title": "Red Hat Security Advisory: dhcp security and enhancement update", "tracking": { "current_release_date": "2024-09-16T09:36:28+00:00", "generator": { "date": "2024-09-16T09:36:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2023:2502", "initial_release_date": "2023-05-09T09:51:36+00:00", "revision_history": [ { "date": "2023-05-09T09:51:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-09T09:51:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-16T09:36:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dhcp-12:4.4.2-18.b1.el9.src", "product": { "name": "dhcp-12:4.4.2-18.b1.el9.src", "product_id": "dhcp-12:4.4.2-18.b1.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@4.4.2-18.b1.el9?arch=src\u0026epoch=12" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dhcp-client-12:4.4.2-18.b1.el9.aarch64", "product": { "name": "dhcp-client-12:4.4.2-18.b1.el9.aarch64", "product_id": "dhcp-client-12:4.4.2-18.b1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client@4.4.2-18.b1.el9?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "product": { "name": "dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "product_id": "dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay@4.4.2-18.b1.el9?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-12:4.4.2-18.b1.el9.aarch64", "product": { "name": "dhcp-server-12:4.4.2-18.b1.el9.aarch64", "product_id": "dhcp-server-12:4.4.2-18.b1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server@4.4.2-18.b1.el9?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "product": { "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "product_id": "dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debugsource@4.4.2-18.b1.el9?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product": { "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product_id": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client-debuginfo@4.4.2-18.b1.el9?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product": { "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product_id": "dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.4.2-18.b1.el9?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product": { "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product_id": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay-debuginfo@4.4.2-18.b1.el9?arch=aarch64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product": { "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product_id": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server-debuginfo@4.4.2-18.b1.el9?arch=aarch64\u0026epoch=12" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "product": { "name": "dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "product_id": "dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client@4.4.2-18.b1.el9?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "product": { "name": "dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "product_id": "dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay@4.4.2-18.b1.el9?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "product": { "name": "dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "product_id": "dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server@4.4.2-18.b1.el9?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "product": { "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "product_id": "dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debugsource@4.4.2-18.b1.el9?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product": { "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product_id": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client-debuginfo@4.4.2-18.b1.el9?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product": { "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product_id": "dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.4.2-18.b1.el9?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product": { "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product_id": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay-debuginfo@4.4.2-18.b1.el9?arch=ppc64le\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product": { "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product_id": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server-debuginfo@4.4.2-18.b1.el9?arch=ppc64le\u0026epoch=12" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dhcp-client-12:4.4.2-18.b1.el9.x86_64", "product": { "name": "dhcp-client-12:4.4.2-18.b1.el9.x86_64", "product_id": "dhcp-client-12:4.4.2-18.b1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client@4.4.2-18.b1.el9?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "product": { "name": "dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "product_id": "dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay@4.4.2-18.b1.el9?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-12:4.4.2-18.b1.el9.x86_64", "product": { "name": "dhcp-server-12:4.4.2-18.b1.el9.x86_64", "product_id": "dhcp-server-12:4.4.2-18.b1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server@4.4.2-18.b1.el9?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "product": { "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "product_id": "dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debugsource@4.4.2-18.b1.el9?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product": { "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product_id": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client-debuginfo@4.4.2-18.b1.el9?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product": { "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product_id": "dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.4.2-18.b1.el9?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product": { "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product_id": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay-debuginfo@4.4.2-18.b1.el9?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product": { "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product_id": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server-debuginfo@4.4.2-18.b1.el9?arch=x86_64\u0026epoch=12" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dhcp-client-12:4.4.2-18.b1.el9.s390x", "product": { "name": "dhcp-client-12:4.4.2-18.b1.el9.s390x", "product_id": "dhcp-client-12:4.4.2-18.b1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client@4.4.2-18.b1.el9?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-12:4.4.2-18.b1.el9.s390x", "product": { "name": "dhcp-relay-12:4.4.2-18.b1.el9.s390x", "product_id": "dhcp-relay-12:4.4.2-18.b1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay@4.4.2-18.b1.el9?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-12:4.4.2-18.b1.el9.s390x", "product": { "name": "dhcp-server-12:4.4.2-18.b1.el9.s390x", "product_id": "dhcp-server-12:4.4.2-18.b1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server@4.4.2-18.b1.el9?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "product": { "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "product_id": "dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debugsource@4.4.2-18.b1.el9?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "product": { "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "product_id": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-client-debuginfo@4.4.2-18.b1.el9?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "product": { "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "product_id": "dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.4.2-18.b1.el9?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "product": { "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "product_id": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-relay-debuginfo@4.4.2-18.b1.el9?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "product": { "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "product_id": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-server-debuginfo@4.4.2-18.b1.el9?arch=s390x\u0026epoch=12" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dhcp-common-12:4.4.2-18.b1.el9.noarch", "product": { "name": "dhcp-common-12:4.4.2-18.b1.el9.noarch", "product_id": "dhcp-common-12:4.4.2-18.b1.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-common@4.4.2-18.b1.el9?arch=noarch\u0026epoch=12" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.4.2-18.b1.el9.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-12:4.4.2-18.b1.el9.src" }, "product_reference": "dhcp-12:4.4.2-18.b1.el9.src", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-12:4.4.2-18.b1.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.aarch64" }, "product_reference": "dhcp-client-12:4.4.2-18.b1.el9.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-12:4.4.2-18.b1.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.ppc64le" }, "product_reference": "dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-12:4.4.2-18.b1.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.s390x" }, "product_reference": "dhcp-client-12:4.4.2-18.b1.el9.s390x", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-12:4.4.2-18.b1.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.x86_64" }, "product_reference": "dhcp-client-12:4.4.2-18.b1.el9.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64" }, "product_reference": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le" }, "product_reference": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x" }, "product_reference": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64" }, "product_reference": "dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-common-12:4.4.2-18.b1.el9.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-common-12:4.4.2-18.b1.el9.noarch" }, "product_reference": "dhcp-common-12:4.4.2-18.b1.el9.noarch", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64" }, "product_reference": "dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le" }, "product_reference": "dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x" }, "product_reference": "dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64" }, "product_reference": "dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le" }, "product_reference": "dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.s390x" }, "product_reference": "dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64" }, "product_reference": "dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-12:4.4.2-18.b1.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.aarch64" }, "product_reference": "dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-12:4.4.2-18.b1.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.ppc64le" }, "product_reference": "dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-12:4.4.2-18.b1.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.s390x" }, "product_reference": "dhcp-relay-12:4.4.2-18.b1.el9.s390x", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-12:4.4.2-18.b1.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.x86_64" }, "product_reference": "dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64" }, "product_reference": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le" }, "product_reference": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x" }, "product_reference": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64" }, "product_reference": "dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-12:4.4.2-18.b1.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.aarch64" }, "product_reference": "dhcp-server-12:4.4.2-18.b1.el9.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-12:4.4.2-18.b1.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.ppc64le" }, "product_reference": "dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-12:4.4.2-18.b1.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.s390x" }, "product_reference": "dhcp-server-12:4.4.2-18.b1.el9.s390x", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-12:4.4.2-18.b1.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.x86_64" }, "product_reference": "dhcp-server-12:4.4.2-18.b1.el9.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64" }, "product_reference": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le" }, "product_reference": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x" }, "product_reference": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "relates_to_product_reference": "BaseOS-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64" }, "product_reference": "dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "VictorV" ], "organization": "Cyber Kunlun Lab", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-2928", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132002" } ], "notes": [ { "category": "description", "text": "An integer overflow vulnerability was found in the DHCP server. When the \"option_code_hash_lookup()\" function is called from \"add_option()\", it increases the option\u0027s \"refcount\" field. However, there is not a corresponding call to \"option_dereference()\" to decrement the \"refcount\" field. The \"add_option()\" function is only used in server responses to lease query packets. Each lease query response calls this function for several options. Hence, a DHCP server configured with \"allow lease query,\" a remote machine with access to the server, can send lease queries for the same lease multiple times, leading to the \"add_option()\" function being called repeatedly. This issue could cause the reference counters to overflow and the server to abort or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort", "title": "Vulnerability summary" }, { "category": "other", "text": "Vulnerable servers are network accessible to an attacker and configured to allow and process lease queries.\n\nInternally, reference counters are integers and thus overflow at 2^31 references, so even at 1000 lease query responses per second, it would take more than three weeks to crash the server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.GA:dhcp-12:4.4.2-18.b1.el9.src", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-common-12:4.4.2-18.b1.el9.noarch", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2928" }, { "category": "external", "summary": "RHBZ#2132002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2928", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2928" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2928", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2928" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-2928", "url": "https://kb.isc.org/docs/cve-2022-2928" } ], "release_date": "2022-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.GA:dhcp-12:4.4.2-18.b1.el9.src", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-common-12:4.4.2-18.b1.el9.noarch", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2502" }, { "category": "workaround", "details": "Possible workaround - Disable lease query on the server for DHCPv4 or restart the server periodically.", "product_ids": [ "BaseOS-9.2.0.GA:dhcp-12:4.4.2-18.b1.el9.src", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-common-12:4.4.2-18.b1.el9.noarch", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.GA:dhcp-12:4.4.2-18.b1.el9.src", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-common-12:4.4.2-18.b1.el9.noarch", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort" }, { "acknowledgments": [ { "names": [ "VictorV" ], "organization": "Cyber Kunlun Lab", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-2929", "discovery_date": "2022-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132001" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the DHCP server where the \"fqdn_universe_decode()\" function allocates buffer space for the contents of option 81 (fqdn) data received in a DHCP packet. The maximum length of a DNS \"label\" is 63 bytes. The function tests the length byte of each label contained in the \"fqdn\"; if it finds a label whose length byte value is larger than 63, it returns without dereferencing the buffer space. This issue causes a memory leak. On a system with access to a DHCP server, an attacker from any adjacent network could send DHCP packets crafted to include \"fqdn\" labels longer than 63 bytes to the DHCP server, eventually causing the server to run out of memory and crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhcp: DHCP memory leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.GA:dhcp-12:4.4.2-18.b1.el9.src", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-common-12:4.4.2-18.b1.el9.noarch", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2929" }, { "category": "external", "summary": "RHBZ#2132001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2929", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2929" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-2929", "url": "https://kb.isc.org/docs/cve-2022-2929" } ], "release_date": "2022-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.GA:dhcp-12:4.4.2-18.b1.el9.src", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-common-12:4.4.2-18.b1.el9.noarch", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2502" }, { "category": "workaround", "details": "Possible workaround - As exploiting this vulnerability requires an attacker to send packets for an extended period of time, restarting servers periodically could be a viable workaround.", "product_ids": [ "BaseOS-9.2.0.GA:dhcp-12:4.4.2-18.b1.el9.src", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-common-12:4.4.2-18.b1.el9.noarch", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.GA:dhcp-12:4.4.2-18.b1.el9.src", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-client-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-common-12:4.4.2-18.b1.el9.noarch", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-debugsource-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-relay-debuginfo-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-12:4.4.2-18.b1.el9.x86_64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.aarch64", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.ppc64le", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.s390x", "BaseOS-9.2.0.GA:dhcp-server-debuginfo-12:4.4.2-18.b1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dhcp: DHCP memory leak" } ] }
sca-2025-0009
Vulnerability from csaf_sick
Published
2025-08-01 13:00
Modified
2025-08-01 13:00
Summary
Vulnerabilities affecting SICK TDC-E210GC
Notes
summary
SICK has identified multiple vulnerabilities in the SICK TDC-E210GC product. The advisory includes a total of 23 vulnerabilities, of which 14 are confirmed as affected and 9 as known not affected. At this time, SICK is not aware of any public exploits specifically targeting these vulnerabilities. Customers are strongly advised to apply the recommended workaround for the affected vulnerabilities to reduce potential risk.
General Security Measures
As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "summary", "text": "SICK has identified multiple vulnerabilities in the SICK TDC-E210GC product. The advisory includes a total of 23 vulnerabilities, of which 14 are confirmed as affected and 9 as known not affected. At this time, SICK is not aware of any public exploits specifically targeting these vulnerabilities. Customers are strongly advised to apply the recommended workaround for the affected vulnerabilities to reduce potential risk.", "title": "summary" }, { "category": "general", "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Security Measures" }, { "category": "general", "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.", "title": "Vulnerability Classification" } ], "publisher": { "category": "vendor", "contact_details": "psirt@sick.de", "issuing_authority": "SICK PSIRT is responsible for any vulnerabilities related to SICK products.", "name": "SICK PSIRT", "namespace": "https://www.sick.com/psirt" }, "references": [ { "summary": "SICK PSIRT Security Advisories", "url": "https://sick.com/psirt" }, { "summary": "SICK Operating Guidelines", "url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf" }, { "summary": "ICS-CERT recommended practices on Industrial Security", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "summary": "CVSS v3.1 Calculator", "url": "https://www.first.org/cvss/calculator/3.1" }, { "category": "self", "summary": "The canonical URL.", "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0009.json" } ], "title": "Vulnerabilities affecting SICK TDC-E210GC", "tracking": { "current_release_date": "2025-08-01T13:00:00.000Z", "generator": { "date": "2025-08-01T08:14:37.621Z", "engine": { "name": "Secvisogram", "version": "2.5.32" } }, "id": "SCA-2025-0009", "initial_release_date": "2025-08-01T13:00:00.000Z", "revision_history": [ { "date": "2025-08-01T13:00:00.000Z", "number": "1", "summary": "Initial version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK TDC-E210GC all versions", "product_id": "CSAFPID-0001", "product_identification_helper": { "skus": [ "6070344" ] } } } ], "category": "product_name", "name": "TDC-E210GC" } ], "category": "product_family", "name": "Telematic Data Collector" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK TDC-E210GC Firmware all versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "TDC-E210GC Firmware" } ], "category": "vendor", "name": "SICK AG" } ], "relationships": [ { "category": "installed_on", "full_product_name": { "name": "SICK TDC-E210GC all Firmware versions", "product_id": "CSAFPID-0003" }, "product_reference": "CSAFPID-0002", "relates_to_product_reference": "CSAFPID-0001" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-428", "name": "Unquoted Search Path or Element" }, "notes": [ { "category": "summary", "text": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "environmentalScore": 9.8, "environmentalSeverity": "CRITICAL", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 9.8, "temporalSeverity": "CRITICAL", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Remote Code Execution Due to an Inssufficiently Trustworthy Search Path" }, { "cve": "CVE-2021-23017", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.7, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.7, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "NGINX Off-by-One Error" }, { "cve": "CVE-2020-12062", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client\u0027s download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that \"this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol\" and \"utimes does not fail under normal circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Inproper Input Validation in OpenSSH 8.2" }, { "cve": "CVE-2021-41874", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An unauthorized access vulnerabiitly exists in all versions of Portainer, which could let a malicious user obtain sensitive information. NOTE: Portainer has received no detail of this CVE report. There is also no response after multiple attempts of contacting the original source.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Unauthorized Access Vulnerabiitly in All Versions of Portainer" }, { "cve": "CVE-2021-25217", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16, ISC DHCP 4.4.0 -\u003e 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.4, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "temporalScore": 7.4, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "A Buffer Overrun in Lease File Parsing Code Can Be Used to Exploit a Common Vulnerability Shared by DHCPD and Dhclient" }, { "cve": "CVE-2021-3618", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim\u0027s traffic at the TCP/IP layer can redirect traffic from one subdomainto another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.4, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.4, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Broken Authentication of TLS" }, { "cve": "CVE-2021-28041", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "SSH-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.1, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7.1, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Double Free in OpenSSH" }, { "cve": "CVE-2020-15778", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Command Injection in the OpenSSH scp.c to Remote Function" }, { "cve": "CVE-2021-42650", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "Cross Site Scripting (XSS) vulnerability exists in Portainer before 2.9.1 via the node input box in Custom Templates.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 6.1, "environmentalSeverity": "MEDIUM", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "temporalScore": 6.1, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Portainer XSS Vulnerability" }, { "cve": "CVE-2016-20012", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH User Enumeration" }, { "cve": "CVE-2025-26465", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalScore": 6.8, "environmentalSeverity": "MEDIUM", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.8, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH VerifyHostKeyDNS Vulnerable to Mashine-in-the-Middle" }, { "cve": "CVE-2019-20372", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "NGINX Allows HTTP Request Smuggling" }, { "cve": "CVE-2020-14145", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalScore": 5.9, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.9, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Information Leak in the Algorithm Negotiation" }, { "cve": "CVE-2021-36368", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user\u0027s behalf. NOTE: the vendor\u0027s position is \"this is not an authentication bypass, since nothing is being bypassed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalScore": 6.8, "environmentalSeverity": "MEDIUM", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.8, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Vulnerable to Authentication Bypass" }, { "cve": "CVE-2022-24961", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "In Portainer Agent before 2.11.1, an API server can continue running even if not associated with a Portainer instance in the past few days. The vulnerability allows the API server to run even when not linked to a Portainer instance recently, posing a security risk.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "environmentalScore": 9.8, "environmentalSeverity": "CRITICAL", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 9.8, "temporalSeverity": "CRITICAL", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Portainer Agent API Server Vulnerability" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Denial of Service in HTTP/2 Protocol" }, { "cve": "CVE-2021-41617", "cwe": { "id": "CWE-273", "name": "Improper Check for Dropped Privileges" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Privilege Escalation" }, { "cve": "CVE-2023-51767", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Authentication Bypass Vulnerability" }, { "cve": "CVE-2008-3844", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Trojan Horse at RHEL4 for OpenSSH" }, { "cve": "CVE-2022-2929", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "In ISC DHCP 1.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 6.5, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "DHCP Memory Leak" }, { "cve": "CVE-2022-2928", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 6.5, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "An Option Refcount Overflow Exists in DHCPD" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 5.9, "environmentalSeverity": "MEDIUM", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.9, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Vulnerable for Bypassing Integrity Checks" }, { "cve": "CVE-2007-2768", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "environmentalScore": 3.7, "environmentalSeverity": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 3.7, "temporalSeverity": "LOW", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH User Enumeration Using OPIE" } ] }
ghsa-5fp7-mmwq-gvmw
Vulnerability from github
Published
2022-10-07 18:16
Modified
2022-10-13 19:00
Severity ?
Details
In ISC DHCP 4.4.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option's refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.
{ "affected": [], "aliases": [ "CVE-2022-2928" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-10-07T05:15:00Z", "severity": "HIGH" }, "details": "In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.", "id": "GHSA-5fp7-mmwq-gvmw", "modified": "2022-10-13T19:00:21Z", "published": "2022-10-07T18:16:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2928" }, { "type": "WEB", "url": "https://kb.isc.org/docs/cve-2022-2928" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00015.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SARIK7KZ7MGQIWDRWZFAOSQSPXY4GOU" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QQXYCIWUDILRCNBAIMVFCSGXBRKEPB4K" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6IBFH4MRRNJQVWEKILQ6I6CXWW766FX" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202305-22" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2022-2928
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
In ISC DHCP 4.4.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option's refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-2928", "description": "In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.", "id": "GSD-2022-2928", "references": [ "https://www.debian.org/security/2022/dsa-5251", "https://advisories.mageia.org/CVE-2022-2928.html", "https://www.suse.com/security/cve/CVE-2022-2928.html", "https://ubuntu.com/security/CVE-2022-2928" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-2928" ], "details": "In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.", "id": "GSD-2022-2928", "modified": "2023-12-13T01:19:19.838246Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-officer@isc.org", "DATE_PUBLIC": "2022-10-05T12:01:00.000Z", "ID": "CVE-2022-2928", "STATE": "PUBLIC", "TITLE": "An option refcount overflow exists in dhcpd" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ISC DHCP", "version": { "version_data": [ { "version_name": "4.4", "version_value": "4.4.0 through versions before 4.4.3-P1" }, { "version_name": "4.1 ESV", "version_value": "4.1-ESV-R1 through versions before 4.1-ESV-R16-P1" } ] } } ] }, "vendor_name": "ISC" } ] } }, "credit": [ { "lang": "eng", "value": "ISC would like to thank VictorV of Cyber Kunlun Lab for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort." } ] }, "exploit": [ { "lang": "eng", "value": "We are not aware of any active exploits." } ], "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "A DHCP server configured with allow leasequery;, a remote machine with access to the server can send lease queries for the same lease multiple times, leading to the add_option() function being repeatedly called. This could cause an option\u0027s refcount field to overflow and the server to abort. Internally, reference counters are integers and thus overflow at 2^31 references, so even at 1000 lease query responses per second, it would take more than three weeks to crash the server. Affects In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.isc.org/docs/cve-2022-2928", "refsource": "CONFIRM", "url": "https://kb.isc.org/docs/cve-2022-2928" }, { "name": "[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00015.html" }, { "name": "FEDORA-2022-f5a45757df", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QQXYCIWUDILRCNBAIMVFCSGXBRKEPB4K/" }, { "name": "FEDORA-2022-9ca9a94e28", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6IBFH4MRRNJQVWEKILQ6I6CXWW766FX/" }, { "name": "FEDORA-2022-c4f274a54f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SARIK7KZ7MGQIWDRWZFAOSQSPXY4GOU/" }, { "name": "GLSA-202305-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202305-22" } ] }, "solution": [ { "lang": "eng", "value": "Upgrade to the patched release most closely related to your current version of ISC DHCP. These can all be downloaded from https://www.isc.org/downloads. 4.4.3-P1 4.1-ESV-R16-P2" } ], "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "eng", "value": "Disable lease query on the server for DHCPv4 or restart the server periodically." } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r10b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r10rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r11b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r11rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r11rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r12-p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r12b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r13b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r14b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r15-p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r15_b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:r16-p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.4.3", "versionStartIncluding": "4.4.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-officer@isc.org", "ID": "CVE-2022-2928" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.isc.org/docs/cve-2022-2928", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://kb.isc.org/docs/cve-2022-2928" }, { "name": "[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00015.html" }, { "name": "FEDORA-2022-f5a45757df", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QQXYCIWUDILRCNBAIMVFCSGXBRKEPB4K/" }, { "name": "FEDORA-2022-9ca9a94e28", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6IBFH4MRRNJQVWEKILQ6I6CXWW766FX/" }, { "name": "FEDORA-2022-c4f274a54f", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SARIK7KZ7MGQIWDRWZFAOSQSPXY4GOU/" }, { "name": "GLSA-202305-22", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/202305-22" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2023-05-03T12:16Z", "publishedDate": "2022-10-07T05:15Z" } } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.