{"affected":[{"ecosystem_specific":{"binaries":[{"pdns-recursor":"4.1.12-bp152.2.4.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP2","name":"pdns-recursor","purl":"pkg:rpm/suse/pdns-recursor&distro=SUSE%20Package%20Hub%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.1.12-bp152.2.4.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for pdns-recursor fixes the following issues:\n\n- CVE-2020-14196: Fixed an access restriction bypass with API key and password authentication (boo#1173302).\n\nThis update was imported from the openSUSE:Leap:15.1:Update update project.","id":"openSUSE-SU-2020:1055-1","modified":"2020-07-24T08:48:43Z","published":"2020-07-24T08:48:43Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V26MM5MLJOYDZLKUVS7FH4E3TYLDPGPO/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14196"}],"related":["CVE-2020-14196"],"summary":"Security update for pdns-recursor","upstream":["CVE-2020-14196"]}