Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-13207 (GCVE-0-2019-13207)
Vulnerability from cvelistv5
Published
2019-07-03 19:49
Modified
2024-08-04 23:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:41:10.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "name": "FEDORA-2019-96fe76e02b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-08T04:06:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "name": "FEDORA-2019-96fe76e02b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13207", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/NLnetLabs/nsd/issues/20", "refsource": "MISC", "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "name": "FEDORA-2019-96fe76e02b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13207", "datePublished": "2019-07-03T19:49:12", "dateReserved": "2019-07-03T00:00:00", "dateUpdated": "2024-08-04T23:41:10.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-13207\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-07-03T20:15:11.823\",\"lastModified\":\"2024-11-21T04:24:27.637\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.\"},{\"lang\":\"es\",\"value\":\"nsd-checkzone en NLnet Labs NSD versi\u00f3n 4.2.0 tiene un Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n dname_concatenate () en dname.c.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nlnetlabs:name_server_daemon:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1094EB8B-F2D4-4E0D-8984-2BE120CD8739\"}]}]}],\"references\":[{\"url\":\"https://github.com/NLnetLabs/nsd/issues/20\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/NLnetLabs/nsd/issues/20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
opensuse-su-2024:11100-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
nsd-4.3.7-1.2 on GA media
Notes
Title of the patch
nsd-4.3.7-1.2 on GA media
Description of the patch
These are all security issues fixed in the nsd-4.3.7-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11100
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "nsd-4.3.7-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the nsd-4.3.7-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11100", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11100-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2979 page", "url": "https://www.suse.com/security/cve/CVE-2012-2979/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6173 page", "url": "https://www.suse.com/security/cve/CVE-2016-6173/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13207 page", "url": "https://www.suse.com/security/cve/CVE-2019-13207/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28935 page", "url": "https://www.suse.com/security/cve/CVE-2020-28935/" } ], "title": "nsd-4.3.7-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11100-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nsd-4.3.7-1.2.aarch64", "product": { "name": "nsd-4.3.7-1.2.aarch64", "product_id": "nsd-4.3.7-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nsd-4.3.7-1.2.ppc64le", "product": { "name": "nsd-4.3.7-1.2.ppc64le", "product_id": "nsd-4.3.7-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nsd-4.3.7-1.2.s390x", "product": { "name": "nsd-4.3.7-1.2.s390x", "product_id": "nsd-4.3.7-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nsd-4.3.7-1.2.x86_64", "product": { "name": "nsd-4.3.7-1.2.x86_64", "product_id": "nsd-4.3.7-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.7-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64" }, "product_reference": "nsd-4.3.7-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.7-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le" }, "product_reference": "nsd-4.3.7-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.7-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x" }, "product_reference": "nsd-4.3.7-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.7-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" }, "product_reference": "nsd-4.3.7-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-2979", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2979" } ], "notes": [ { "category": "general", "text": "FreeBSD NSD before 3.2.13 allows remote attackers to crash a NSD child server process (SIGSEGV) and cause a denial of service in the NSD server.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2979", "url": "https://www.suse.com/security/cve/CVE-2012-2979" }, { "category": "external", "summary": "SUSE Bug 774600 for CVE-2012-2979", "url": "https://bugzilla.suse.com/774600" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2979" }, { "cve": "CVE-2016-6173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6173" } ], "notes": [ { "category": "general", "text": "NSD before 4.1.11 allows remote DNS master servers to cause a denial of service (/tmp disk consumption and slave server crash) via a zone transfer with unlimited data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6173", "url": "https://www.suse.com/security/cve/CVE-2016-6173" }, { "category": "external", "summary": "SUSE Bug 987873 for CVE-2016-6173", "url": "https://bugzilla.suse.com/987873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-6173" }, { "cve": "CVE-2019-13207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13207" } ], "notes": [ { "category": "general", "text": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13207", "url": "https://www.suse.com/security/cve/CVE-2019-13207" }, { "category": "external", "summary": "SUSE Bug 1182952 for CVE-2019-13207", "url": "https://bugzilla.suse.com/1182952" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-13207" }, { "cve": "CVE-2020-28935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28935" } ], "notes": [ { "category": "general", "text": "NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Unbound/NSD is running on. It requires an attacker having access to the limited permission user Unbound/NSD runs as and point through the symlink to a critical file on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28935", "url": "https://www.suse.com/security/cve/CVE-2020-28935" }, { "category": "external", "summary": "SUSE Bug 1173619 for CVE-2020-28935", "url": "https://bugzilla.suse.com/1173619" }, { "category": "external", "summary": "SUSE Bug 1179191 for CVE-2020-28935", "url": "https://bugzilla.suse.com/1179191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nsd-4.3.7-1.2.aarch64", "openSUSE Tumbleweed:nsd-4.3.7-1.2.ppc64le", "openSUSE Tumbleweed:nsd-4.3.7-1.2.s390x", "openSUSE Tumbleweed:nsd-4.3.7-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-28935" } ] }
opensuse-su-2020:2222-1
Vulnerability from csaf_opensuse
Published
2020-12-10 11:23
Modified
2020-12-10 11:23
Summary
Security update for nsd
Notes
Title of the patch
Security update for nsd
Description of the patch
This update for nsd fixes the following issues:
nsd was updated to the new upstream release 4.3.4
FEATURES:
- Merge PR #141: ZONEMD RR type.
BUG FIXES:
- Fix that symlink does not interfere with chown of pidfile
(boo#1179191, CVE-2020-28935)
- Fix #128: Fix that the invalid port number is logged for sendmmsg failed: Invalid argument.
- Fix #133: fix 0-init of local ( stack ) buffer.
- Fix #134: IPV4_MINIMAL_RESPONSE_SIZE vs EDNS_MAX_MESSAGE_LEN.
- Fix to add missing closest encloser NSEC3 for wildcard nodata type DS answer.
- Fix #138: NSD returns non-EDNS answer when QUESTION is empty.
- Fix #142: NODATA answers missin SOA in authority section after CNAME chain.
New upstream release 4.3.3:
FEATURES:
- Follow DNS flag day 2020 advice and set default EDNS message size to 1232.
- Merged PR #113 with fixes. Instead of listing an IP-address to
listen on, an interface name can be specified in nsd.conf, with
ip-address: eth0. The IP-addresses for that interface are then used.
- New upstream release 4.3.2
FEATURES:
- Fix #96: log-only-syslog: yes sets to only use syslog, fixes
that the default configuration and systemd results in duplicate
log messages.
- Fix #107: nsd -v shows configure line, openssl version and libevent
version.
- Fix #103 with #110: min-expire-time option. To provide a lower
bound for expire period. Expressed in number of seconds or
refresh+retry+1.
BUG FIXES:
- Fix to omit the listen-on lines from log at startup, unless verbose.
- Fix #97: EDNS unknown version: query not in response.
- Fix #99: Fix copying of socket properties with reuseport enabled.
- Document default value for tcp-timeout.
- Merge PR#102 from and0x000: add missing default in documentation for drop-updates.
- Fix unlink of pidfile warning if not possible due to permissions,
nsd can display the message at high verbosity levels.
- Removed contrib/nsd.service, example is too complicated and not useful.
- Merge #108 from Nomis: Make the max-retry-time description clearer.
- Retry when udp send buffer is full to wait until buffer space is available.
- Remove errno reset behaviour from sendmmsg and recvmmsg replacement functions.
- Fix unit test for different nsd-control-setup -h exit code.
- Merge #112 from jaredmauch: log old and new serials when NSD
rejects an IXFR due to an old serial number.
- Fix #106: Adhere better to xfrd bounds. Refresh and retry times.
- Fix #105: Clearing hash_tree means just emptying the tree.
New upstream release 4.3.1
BUG FIXES:
- Merge PR #91 by gearnode: nsd-control-setup recreate certificates.
The '-r' option recreates certificates. Without it it creates them
if they do not exist, and does not modify them otherwise.
New upstream release 4.3.0
FEATURES:
- Fix to use getrandom() for randomness, if available.
- Fix #56: Drop sparse TSIG signing support in NSD.
Sign every axfr packet with TSIG, according to the latest
draft-ietf-dnsop-rfc2845bis-06, Section 5.3.1.
- Merge pull request #59 from buddyns: add FreeBSD support
for conf key ip-transparent.
- Add feature to pin server processes to specific cpus.
- Add feature to pin IP addresses to selected server processes.
- Set process title to identify individual processes.
- Merge PR#22: minimise-any: prefer polular and not large RRset,
from Daisuke Higashi.
- Add support for SO_BINDTODEVICE on Linux.
- Add feature to drop queries with opcode UPDATE.
BUG FIXES:
- Fix whitespace in nsd.conf.sample.in, patch from Paul Wouters.
- use-systemd is ignored in nsd.conf, when NSD is compiled with
libsystemd it always signals readiness, if possible.
- Note that use-systemd is not necessary and ignored in man page.
- Fix responses for IXFR so that the authority section is not echoed
in the response.
- Fix that the retry wait does not exceed one day for zone transfers.
- Update keyring as per https://nlnetlabs.nl/people/
New upstream release 4.2.3:
* confine-to-zone configures NSD to not return out-of-zone
additional information.
* pidfile '' allows to run NSD without a pidfile
* adds support for readiness notification with READY_FD
* fix excessive logging of ixfr failures, it stops the log when
fallback to axfr is possible. log is enabled at high verbosity.
* The nsd.conf includes are sorted ascending, for include statements
with a '*' from glob.
* Fix log address and failure reason with tls handshake errors,
squelches (the same as unbound) some unless high verbosity is used.
* Number of different UDP handlers has been reduced to one.
recvmmsg and sendmmsg implementations are now used on all platforms.
* Socket options are now set in designated functions for easy reuse.
* Socket setup has been simplified for easy reuse.
* Configuration parser is now aware of the context in which
an option was specified.
* document that remote-control is a top-level nsd.conf attribute.
- Remove legacy upgrade of nsd users in %post (boo#1157331)
New upstream release 4.2.2:
* Fix #20: CVE-2019-13207 Stack-based Buffer Overflow in the
dname_concatenate() function. Reported by Frederic Cambus.
It causes the zone parser to crash on a malformed zone file,
with assertions enabled, an assertion catches it.
* Fix #19: Out-of-bounds read caused by improper validation of
array index. Reported by Frederic Cambus. The zone parser
fails on type SIG because of mismatched definition with RRSIG.
* PR #23: Fix typo in nsd.conf man-page.
* Fix that NSD warns for wrong length of the hash in SSHFP records.
* Fix #25: NSD doesn't refresh zones after extended downtime,
it refreshes the old zones.
* Set no renegotiation on the SSL context to stop client
session renegotiation.
* Fix #29: SSHFP check NULL pointer dereference.
* Fix #30: SSHFP check failure due to missing domain name.
* Fix to timeval_add in minievent for remaining second in microseconds.
* PR #31: nsd-control: Add missing stdio header.
* PR #32: tsig: Fix compilation without HAVE_SSL.
* Cleanup tls context on xfrd exit.
* Fix #33: Fix segfault in service of remaining streams on exit.
* Fix error message for out of zone data to have more information.
New upstream release 4.2.1:
* FEATURES:
- Added num.tls and num.tls6 stat counters.
- PR #12: send-buffer-size, receive-buffer-size,
tcp-reject-overflow options for nsd.conf, from Jeroen Koekkoek.
- Fix #14, tcp connections have 1/10 to be active and have to work
every second, and then they get time to complete during a reload,
this is a process that lingers with the old version during a version
update.
* BUG FIXES:
- Fix #13: Stray dot at the end of some log entries, removes dot
after updated serial number in log entry.
- Fix TLS cipher selection, the previous was redundant, prefers
CHACHA20-POLY1305 over AESGCM and was not as readable as it
could be.
- Fix #15: crash in SSL library, initialize variables for TCP access
when TLS is configured.
- Fix tls handshake event callback function mistake, reported
by Mykhailo Danylenko.
- Fix output of nsd-checkconf -h.
New upstream release 4.2.0:
* Implement TCP fast open
* Added DNS over TLS
* TLS OCSP stapling support with the tls-service-ocsp option
* New option hide-identity can be used in nsd.conf to stop NSD
from responding with the hostname for probe queries that
elicit the chaos class response, this is conform RFC4892
* Disable TLS1.0, TLS1.1 and weak ciphers, enable CIPHER_SERVER_PREFERENCE
Update to upstream release 4.1.27:
* FEATURES:
- Deny ANY with only one RR in response, by default. Patch from
Daisuke Higashi. The deny-any statement in nsd.conf sets ANY
queries over UDP to be further moved to TCP as well.
Also no additional section processig for type ANY, reducing
the response size.
- Fix #4215: on-the-fly change of TSIG keys with patch from Igor, adds
nsd-control print_tsig, update_tsig, add_tsig, assoc_tsig
and del_tsig. These changes are gone after reload, edit the
config file (or a file included from it) to make changes that
last after restart.
* BUG FIXES:
Update to upstream release 4.1.26:
* FEATURES:
- DNSTAP support for NSD, --enable-dnstap and then config in nsd.conf.
- Support SO_REUSEPORT_LB in FreeBSD 12 with the reuseport: yes
option in nsd.conf.
- Added nsd-control changezone. nsd-control changezone name pattern
allows the change of a zone pattern option without downtime for
the zone, in one operation.
* BUG FIXES:
- Fix #4194: Zone file parser derailed by non-FQDN names in RHS of DNSSEC RRs.
- Fix #4202: nsd-control delzone incorrect exit code on error.
- Fix to not set GLOB_NOSORT so the nsd.conf include: files are
sorted and in a predictable order.
- Fix #3433: document that reconfig does not change per-zone stats.
Update to upstream release 4.1.25:
* FEATURES:
- nsd-control prints neater errors for file failures.
* BUG FIXES:
- Fix that nsec3 precompile deletion happens before the RRs of
the zone are deleted.
- Fix printout of accepted remote control connection for unix sockets.
- Fix use_systemd typo/leftover in remote.c.
- Fix codingstyle in nsd-checkconf.c in patch from Sharp Liu.
- append_trailing_slash has one implementation and is not repeated
differently.
- Fix coding style in nsd.c
- Fix to combine the same error function into one, from Xiaobo Liu.
- Fix initialisation in remote.c.
- please clang analyzer and fix parse of IPSECKEY with bad gateway.
- Fix nsd-checkconf fail on bad zone name.
- Annotate exit functions with noreturn.
- Remove unused if clause during server service startup.
- Fix #4156: Fix systemd service manager state change notification
When it is compiled, systemd readiness signalling is enabled.
The option in nsd.conf is not used, it is ignored when read.
Update to upstream release 4.1.24:
- Features
* #4102: control interface via local socket
* configure --enable-systemd (needs pkg-config and libsystemd) can be
used to then use-systemd: yes in nsd.conf and have readiness signalling
with systemd.
* RFC8162 support, for record type SMIMEA.
- Bug Fixes
* Patch to fix openwrt for mac os build darwin detection in configure.
* Fix that first control-interface determines if TLS is used.
Warn when IP address interfaces are used without TLS.
* #4106: Fix that stats printed from nsd-control are recast from
unsigned long to unsigned (remote.c).
* Fix that type CAA (and URI) in the zone file can contain dots
when not in quotes.
* #4133: Fix that when IXFR contains a zone with broken NSEC3PARAM chain,
NSD leniently attempts to find a working NSEC3PARAM.
Update to upstream release 4.1.23:
- Fix NSD time sensitive TSIG compare vulnerability.
Update to upstream release 4.1.22:
- Features:
* refuse-any sends truncation (+TC) in reply to ANY queries
over UDP, and allows TCP queries like normal.
* Use accept4 to speed up answer of TCP queries
- Bug fixes:
* Fix nsec3 hash of parent and child co-hosted nsec3 enabled zones.
* Fix to use same condition for nsec3 hash allocation and free.
- Changes in version 4.1.21:
- Features:
* --enable-memclean cleans up memory for use with memory checkers,
eg. valgrind.
* refuse-any nsd.conf option that refuses queries of type ANY.
* lower memory usage for tcp connections, so tcp-count can be
higher.
- Bug fixes:
* Fix spelling error in xfr-inspect.
* Fix buffer size warnings from compiler on filename lengths.
Patchnames
openSUSE-2020-2222
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nsd", "title": "Title of the patch" }, { "category": "description", "text": "This update for nsd fixes the following issues:\n\nnsd was updated to the new upstream release 4.3.4\n\nFEATURES:\n\n- Merge PR #141: ZONEMD RR type.\n\nBUG FIXES:\n\n- Fix that symlink does not interfere with chown of pidfile\n (boo#1179191, CVE-2020-28935)\n- Fix #128: Fix that the invalid port number is logged for sendmmsg failed: Invalid argument.\n- Fix #133: fix 0-init of local ( stack ) buffer.\n- Fix #134: IPV4_MINIMAL_RESPONSE_SIZE vs EDNS_MAX_MESSAGE_LEN.\n- Fix to add missing closest encloser NSEC3 for wildcard nodata type DS answer.\n- Fix #138: NSD returns non-EDNS answer when QUESTION is empty.\n- Fix #142: NODATA answers missin SOA in authority section after CNAME chain.\n\nNew upstream release 4.3.3:\n\nFEATURES:\n\n- Follow DNS flag day 2020 advice and set default EDNS message size to 1232.\n- Merged PR #113 with fixes. Instead of listing an IP-address to\n listen on, an interface name can be specified in nsd.conf, with\n ip-address: eth0. The IP-addresses for that interface are then used.\n\n- New upstream release 4.3.2\n\nFEATURES:\n\n- Fix #96: log-only-syslog: yes sets to only use syslog, fixes\n that the default configuration and systemd results in duplicate\n log messages.\n- Fix #107: nsd -v shows configure line, openssl version and libevent\n version.\n- Fix #103 with #110: min-expire-time option. To provide a lower\n bound for expire period. Expressed in number of seconds or\n refresh+retry+1.\n\nBUG FIXES:\n\n- Fix to omit the listen-on lines from log at startup, unless verbose.\n- Fix #97: EDNS unknown version: query not in response.\n- Fix #99: Fix copying of socket properties with reuseport enabled.\n- Document default value for tcp-timeout.\n- Merge PR#102 from and0x000: add missing default in documentation for drop-updates.\n- Fix unlink of pidfile warning if not possible due to permissions,\n nsd can display the message at high verbosity levels.\n- Removed contrib/nsd.service, example is too complicated and not useful.\n- Merge #108 from Nomis: Make the max-retry-time description clearer.\n- Retry when udp send buffer is full to wait until buffer space is available.\n- Remove errno reset behaviour from sendmmsg and recvmmsg replacement functions.\n- Fix unit test for different nsd-control-setup -h exit code.\n- Merge #112 from jaredmauch: log old and new serials when NSD\n rejects an IXFR due to an old serial number.\n- Fix #106: Adhere better to xfrd bounds. Refresh and retry times.\n- Fix #105: Clearing hash_tree means just emptying the tree.\n\nNew upstream release 4.3.1\n\nBUG FIXES:\n- Merge PR #91 by gearnode: nsd-control-setup recreate certificates.\n The \u0027-r\u0027 option recreates certificates. Without it it creates them\n if they do not exist, and does not modify them otherwise.\n\nNew upstream release 4.3.0\n\nFEATURES:\n\n- Fix to use getrandom() for randomness, if available.\n- Fix #56: Drop sparse TSIG signing support in NSD.\n Sign every axfr packet with TSIG, according to the latest\n draft-ietf-dnsop-rfc2845bis-06, Section 5.3.1.\n- Merge pull request #59 from buddyns: add FreeBSD support\n for conf key ip-transparent.\n- Add feature to pin server processes to specific cpus.\n- Add feature to pin IP addresses to selected server processes.\n- Set process title to identify individual processes.\n- Merge PR#22: minimise-any: prefer polular and not large RRset,\n from Daisuke Higashi.\n- Add support for SO_BINDTODEVICE on Linux.\n- Add feature to drop queries with opcode UPDATE.\n\nBUG FIXES:\n\n- Fix whitespace in nsd.conf.sample.in, patch from Paul Wouters.\n- use-systemd is ignored in nsd.conf, when NSD is compiled with\n libsystemd it always signals readiness, if possible.\n- Note that use-systemd is not necessary and ignored in man page.\n- Fix responses for IXFR so that the authority section is not echoed\n in the response.\n- Fix that the retry wait does not exceed one day for zone transfers.\n\n- Update keyring as per https://nlnetlabs.nl/people/\n\nNew upstream release 4.2.3:\n\n * confine-to-zone configures NSD to not return out-of-zone\n additional information.\n * pidfile \u0027\u0027 allows to run NSD without a pidfile\n * adds support for readiness notification with READY_FD\n * fix excessive logging of ixfr failures, it stops the log when\n fallback to axfr is possible. log is enabled at high verbosity.\n * The nsd.conf includes are sorted ascending, for include statements\n with a \u0027*\u0027 from glob.\n * Fix log address and failure reason with tls handshake errors,\n squelches (the same as unbound) some unless high verbosity is used.\n * Number of different UDP handlers has been reduced to one.\n recvmmsg and sendmmsg implementations are now used on all platforms.\n * Socket options are now set in designated functions for easy reuse.\n * Socket setup has been simplified for easy reuse.\n * Configuration parser is now aware of the context in which\n an option was specified.\n * document that remote-control is a top-level nsd.conf attribute.\n\n- Remove legacy upgrade of nsd users in %post (boo#1157331)\n\nNew upstream release 4.2.2:\n\n * Fix #20: CVE-2019-13207 Stack-based Buffer Overflow in the\n dname_concatenate() function. Reported by Frederic Cambus.\n It causes the zone parser to crash on a malformed zone file,\n with assertions enabled, an assertion catches it.\n * Fix #19: Out-of-bounds read caused by improper validation of\n array index. Reported by Frederic Cambus. The zone parser\n fails on type SIG because of mismatched definition with RRSIG.\n * PR #23: Fix typo in nsd.conf man-page.\n * Fix that NSD warns for wrong length of the hash in SSHFP records.\n * Fix #25: NSD doesn\u0027t refresh zones after extended downtime,\n it refreshes the old zones.\n * Set no renegotiation on the SSL context to stop client\n session renegotiation.\n * Fix #29: SSHFP check NULL pointer dereference.\n * Fix #30: SSHFP check failure due to missing domain name.\n * Fix to timeval_add in minievent for remaining second in microseconds.\n * PR #31: nsd-control: Add missing stdio header.\n * PR #32: tsig: Fix compilation without HAVE_SSL.\n * Cleanup tls context on xfrd exit.\n * Fix #33: Fix segfault in service of remaining streams on exit.\n * Fix error message for out of zone data to have more information.\n\nNew upstream release 4.2.1:\n\n * FEATURES:\n\n - Added num.tls and num.tls6 stat counters.\n - PR #12: send-buffer-size, receive-buffer-size,\n tcp-reject-overflow options for nsd.conf, from Jeroen Koekkoek.\n - Fix #14, tcp connections have 1/10 to be active and have to work\n every second, and then they get time to complete during a reload,\n this is a process that lingers with the old version during a version\n update.\n\n * BUG FIXES:\n\n - Fix #13: Stray dot at the end of some log entries, removes dot\n after updated serial number in log entry.\n - Fix TLS cipher selection, the previous was redundant, prefers\n CHACHA20-POLY1305 over AESGCM and was not as readable as it\n could be.\n - Fix #15: crash in SSL library, initialize variables for TCP access\n when TLS is configured.\n - Fix tls handshake event callback function mistake, reported\n by Mykhailo Danylenko.\n - Fix output of nsd-checkconf -h.\n\nNew upstream release 4.2.0:\n\n * Implement TCP fast open\n * Added DNS over TLS\n * TLS OCSP stapling support with the tls-service-ocsp option\n * New option hide-identity can be used in nsd.conf to stop NSD\n from responding with the hostname for probe queries that\n elicit the chaos class response, this is conform RFC4892\n * Disable TLS1.0, TLS1.1 and weak ciphers, enable CIPHER_SERVER_PREFERENCE\n\nUpdate to upstream release 4.1.27:\n\n* FEATURES:\n\n - Deny ANY with only one RR in response, by default. Patch from\n Daisuke Higashi. The deny-any statement in nsd.conf sets ANY\n queries over UDP to be further moved to TCP as well.\n Also no additional section processig for type ANY, reducing\n the response size.\n - Fix #4215: on-the-fly change of TSIG keys with patch from Igor, adds\n nsd-control print_tsig, update_tsig, add_tsig, assoc_tsig\n and del_tsig. These changes are gone after reload, edit the\n config file (or a file included from it) to make changes that\n last after restart.\n\n* BUG FIXES:\n\nUpdate to upstream release 4.1.26:\n\n * FEATURES:\n\n - DNSTAP support for NSD, --enable-dnstap and then config in nsd.conf.\n - Support SO_REUSEPORT_LB in FreeBSD 12 with the reuseport: yes\n option in nsd.conf.\n - Added nsd-control changezone. nsd-control changezone name pattern\n allows the change of a zone pattern option without downtime for\n the zone, in one operation.\n\n * BUG FIXES:\n\n - Fix #4194: Zone file parser derailed by non-FQDN names in RHS of DNSSEC RRs.\n - Fix #4202: nsd-control delzone incorrect exit code on error.\n - Fix to not set GLOB_NOSORT so the nsd.conf include: files are\n sorted and in a predictable order.\n - Fix #3433: document that reconfig does not change per-zone stats.\n\nUpdate to upstream release 4.1.25:\n\n * FEATURES:\n\n - nsd-control prints neater errors for file failures.\n\n * BUG FIXES:\n\n - Fix that nsec3 precompile deletion happens before the RRs of\n the zone are deleted.\n - Fix printout of accepted remote control connection for unix sockets.\n - Fix use_systemd typo/leftover in remote.c.\n - Fix codingstyle in nsd-checkconf.c in patch from Sharp Liu.\n - append_trailing_slash has one implementation and is not repeated\n differently.\n - Fix coding style in nsd.c\n - Fix to combine the same error function into one, from Xiaobo Liu.\n - Fix initialisation in remote.c.\n - please clang analyzer and fix parse of IPSECKEY with bad gateway.\n - Fix nsd-checkconf fail on bad zone name.\n - Annotate exit functions with noreturn.\n - Remove unused if clause during server service startup.\n - Fix #4156: Fix systemd service manager state change notification\n When it is compiled, systemd readiness signalling is enabled.\n The option in nsd.conf is not used, it is ignored when read.\n\nUpdate to upstream release 4.1.24:\n\n- Features\n\n * #4102: control interface via local socket\n * configure --enable-systemd (needs pkg-config and libsystemd) can be \n used to then use-systemd: yes in nsd.conf and have readiness signalling \n with systemd.\n * RFC8162 support, for record type SMIMEA.\n - Bug Fixes\n * Patch to fix openwrt for mac os build darwin detection in configure.\n * Fix that first control-interface determines if TLS is used.\n Warn when IP address interfaces are used without TLS.\n * #4106: Fix that stats printed from nsd-control are recast from\n unsigned long to unsigned (remote.c).\n * Fix that type CAA (and URI) in the zone file can contain dots\n when not in quotes.\n * #4133: Fix that when IXFR contains a zone with broken NSEC3PARAM chain,\n NSD leniently attempts to find a working NSEC3PARAM.\n\nUpdate to upstream release 4.1.23:\n\n - Fix NSD time sensitive TSIG compare vulnerability.\n\nUpdate to upstream release 4.1.22:\n\n - Features:\n * refuse-any sends truncation (+TC) in reply to ANY queries\n over UDP, and allows TCP queries like normal.\n * Use accept4 to speed up answer of TCP queries\n - Bug fixes:\n * Fix nsec3 hash of parent and child co-hosted nsec3 enabled zones.\n * Fix to use same condition for nsec3 hash allocation and free.\n\n- Changes in version 4.1.21:\n\n - Features:\n * --enable-memclean cleans up memory for use with memory checkers,\n eg. valgrind.\n * refuse-any nsd.conf option that refuses queries of type ANY.\n * lower memory usage for tcp connections, so tcp-count can be\n higher.\n - Bug fixes:\n * Fix spelling error in xfr-inspect.\n * Fix buffer size warnings from compiler on filename lengths.\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-2222", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2222-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:2222-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FIDKYB6WSN55OA36HXF3BL4UYWBXAEV/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:2222-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FIDKYB6WSN55OA36HXF3BL4UYWBXAEV/" }, { "category": "self", "summary": "SUSE Bug 1157331", "url": "https://bugzilla.suse.com/1157331" }, { "category": "self", "summary": "SUSE Bug 1179191", "url": "https://bugzilla.suse.com/1179191" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13207 page", "url": "https://www.suse.com/security/cve/CVE-2019-13207/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28935 page", "url": "https://www.suse.com/security/cve/CVE-2020-28935/" } ], "title": "Security update for nsd", "tracking": { "current_release_date": "2020-12-10T11:23:12Z", "generator": { "date": "2020-12-10T11:23:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:2222-1", "initial_release_date": "2020-12-10T11:23:12Z", "revision_history": [ { "date": "2020-12-10T11:23:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nsd-4.3.4-bp152.2.3.1.aarch64", "product": { "name": "nsd-4.3.4-bp152.2.3.1.aarch64", "product_id": "nsd-4.3.4-bp152.2.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nsd-4.3.4-bp152.2.3.1.ppc64le", "product": { "name": "nsd-4.3.4-bp152.2.3.1.ppc64le", "product_id": "nsd-4.3.4-bp152.2.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nsd-4.3.4-bp152.2.3.1.s390x", "product": { "name": "nsd-4.3.4-bp152.2.3.1.s390x", "product_id": "nsd-4.3.4-bp152.2.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nsd-4.3.4-bp152.2.3.1.x86_64", "product": { "name": "nsd-4.3.4-bp152.2.3.1.x86_64", "product_id": "nsd-4.3.4-bp152.2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } }, { "category": "product_name", "name": "SUSE Package Hub 15 SP1", "product": { "name": "SUSE Package Hub 15 SP1", "product_id": "SUSE Package Hub 15 SP1" } }, { "category": "product_name", "name": "SUSE Package Hub 15 SP2", "product": { "name": "SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2" } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.aarch64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.aarch64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.ppc64le as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.ppc64le" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.s390x as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.s390x" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.x86_64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.aarch64 as component of SUSE Package Hub 15 SP1", "product_id": "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.aarch64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.ppc64le as component of SUSE Package Hub 15 SP1", "product_id": "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.ppc64le" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.s390x as component of SUSE Package Hub 15 SP1", "product_id": "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.s390x" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.x86_64 as component of SUSE Package Hub 15 SP1", "product_id": "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.x86_64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.aarch64 as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.aarch64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.ppc64le as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.ppc64le" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.s390x as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.s390x" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.x86_64 as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.x86_64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.aarch64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.aarch64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.ppc64le as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.ppc64le" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.s390x as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.s390x" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.x86_64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.aarch64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.aarch64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.ppc64le as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.ppc64le" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.s390x as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.s390x" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "nsd-4.3.4-bp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.x86_64" }, "product_reference": "nsd-4.3.4-bp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13207" } ], "notes": [ { "category": "general", "text": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13207", "url": "https://www.suse.com/security/cve/CVE-2019-13207" }, { "category": "external", "summary": "SUSE Bug 1182952 for CVE-2019-13207", "url": "https://bugzilla.suse.com/1182952" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-10T11:23:12Z", "details": "moderate" } ], "title": "CVE-2019-13207" }, { "cve": "CVE-2020-28935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28935" } ], "notes": [ { "category": "general", "text": "NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Unbound/NSD is running on. It requires an attacker having access to the limited permission user Unbound/NSD runs as and point through the symlink to a critical file on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28935", "url": "https://www.suse.com/security/cve/CVE-2020-28935" }, { "category": "external", "summary": "SUSE Bug 1173619 for CVE-2020-28935", "url": "https://bugzilla.suse.com/1173619" }, { "category": "external", "summary": "SUSE Bug 1179191 for CVE-2020-28935", "url": "https://bugzilla.suse.com/1179191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 12:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP1:nsd-4.3.4-bp152.2.3.1.x86_64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.aarch64", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.ppc64le", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.s390x", "SUSE Package Hub 15 SP2:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.1:nsd-4.3.4-bp152.2.3.1.x86_64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.aarch64", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.ppc64le", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.s390x", "openSUSE Leap 15.2:nsd-4.3.4-bp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-10T11:23:12Z", "details": "moderate" } ], "title": "CVE-2020-28935" } ] }
ghsa-mgj6-9wrc-v2rp
Vulnerability from github
Published
2022-05-24 16:49
Modified
2022-05-24 16:49
VLAI Severity ?
Details
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
{ "affected": [], "aliases": [ "CVE-2019-13207" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-03T20:15:00Z", "severity": "CRITICAL" }, "details": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.", "id": "GHSA-mgj6-9wrc-v2rp", "modified": "2022-05-24T16:49:28Z", "published": "2022-05-24T16:49:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13207" }, { "type": "WEB", "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2019-13207
Vulnerability from fkie_nvd
Published
2019-07-03 20:15
Modified
2024-11-21 04:24
Severity ?
Summary
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/NLnetLabs/nsd/issues/20 | Exploit, Third Party Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/NLnetLabs/nsd/issues/20 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
nlnetlabs | name_server_daemon | 4.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nlnetlabs:name_server_daemon:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1094EB8B-F2D4-4E0D-8984-2BE120CD8739", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c." }, { "lang": "es", "value": "nsd-checkzone en NLnet Labs NSD versi\u00f3n 4.2.0 tiene un Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n dname_concatenate () en dname.c." } ], "id": "CVE-2019-13207", "lastModified": "2024-11-21T04:24:27.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-03T20:15:11.823", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2019-13207
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-13207", "description": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.", "id": "GSD-2019-13207", "references": [ "https://www.suse.com/security/cve/CVE-2019-13207.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-13207" ], "details": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.", "id": "GSD-2019-13207", "modified": "2023-12-13T01:23:41.577652Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13207", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/NLnetLabs/nsd/issues/20", "refsource": "MISC", "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "name": "FEDORA-2019-96fe76e02b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nlnetlabs:name_server_daemon:4.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13207" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/NLnetLabs/nsd/issues/20", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "name": "FEDORA-2019-96fe76e02b", "refsource": "FEDORA", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2020-08-24T17:37Z", "publishedDate": "2019-07-03T20:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…