{"affected":[{"ecosystem_specific":{"binaries":[{"dnsdist":"1.8.0-150100.3.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","name":"dnsdist","purl":"pkg:rpm/suse/dnsdist&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0-150100.3.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"dnsdist":"1.8.0-150100.3.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP2-LTSS","name":"dnsdist","purl":"pkg:rpm/suse/dnsdist&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0-150100.3.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"dnsdist":"1.8.0-150100.3.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"dnsdist","purl":"pkg:rpm/suse/dnsdist&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0-150100.3.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"dnsdist":"1.8.0-150100.3.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","name":"dnsdist","purl":"pkg:rpm/suse/dnsdist&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0-150100.3.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"dnsdist":"1.8.0-150100.3.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP2","name":"dnsdist","purl":"pkg:rpm/suse/dnsdist&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0-150100.3.5.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for dnsdist fixes the following issues:\n\n- Implements package 'dnsdist' with version 1.8.0 in SLE15. (jsc#PED-3402)\n- Downstream DNS resolver configuration should be chosen by the admin\n- Security fix: fixes a possible record smugging with a crafted DNS query with trailing data (CVE-2018-14663, bsc#1114511)\n- Security fix: There is an issue that can lead to a denial of service on 32-bit if a backend sends crafted answers. (CVE-2016-7069, bsc#1054799)\n- Security fix: Alteration of dnsdist's ACL if the API is enabled, writable and an authenticated user is tricked into visiting a crafted website. (CVE-2017-7557, bsc#1054799)\n- SNMP support, exporting statistics and sending traps\n- Preventing the packet cache from ageing responses when deployed in\n- Various DNSCrypt-related fixes and improvements, including automatic key rotation\n  ","id":"SUSE-SU-2023:2777-1","modified":"2023-07-04T08:39:57Z","published":"2023-07-04T08:39:57Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20232777-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1054799"},{"type":"REPORT","url":"https://bugzilla.suse.com/1054802"},{"type":"REPORT","url":"https://bugzilla.suse.com/1114511"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7069"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7557"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14663"}],"related":["CVE-2016-7069","CVE-2017-7557","CVE-2018-14663"],"summary":"Security update for dnsdist","upstream":["CVE-2016-7069","CVE-2017-7557","CVE-2018-14663"]}