Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-8671 (GCVE-0-2025-8671)
Vulnerability from cvelistv5 – Published: 2025-08-13 12:03 – Updated: 2025-11-04 21:15| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| SUSE Linux | Enterprise Module for Development Tools |
Affected:
15 SP2 , < 15-SP5
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-8671",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-13T18:34:19.913332Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-404",
"description": "CWE-404 Improper Resource Shutdown or Release",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-13T19:57:17.805Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:15:08.215Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://github.com/envoyproxy/envoy/issues/40739"
},
{
"url": "https://github.com/varnish/hitch/issues/397"
},
{
"url": "https://github.com/Kong/kong/discussions/14731"
},
{
"url": "https://deepness-lab.org/publications/madeyoureset/"
},
{
"url": "https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/"
},
{
"url": "https://www.kb.cert.org/vuls/id/767506"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/09/18/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/08/13/6"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Enterprise Module for Development Tools",
"vendor": "SUSE Linux",
"versions": [
{
"lessThan": "15-SP5",
"status": "affected",
"version": "15 SP2",
"versionType": "custom"
}
]
},
{
"product": "Enterprise High Performance Computing (HPC)",
"vendor": "SUSE Linux",
"versions": [
{
"lessThan": "15 SP5",
"status": "affected",
"version": "15",
"versionType": "custom"
}
]
},
{
"product": "Varnish Enterprise",
"vendor": "Varnish Software",
"versions": [
{
"lessThanOrEqual": "6.0.14r4",
"status": "affected",
"version": "6.0.x",
"versionType": "custom"
}
]
},
{
"product": "Varnish Cache",
"vendor": "Varnish Software",
"versions": [
{
"lessThanOrEqual": "6.014",
"status": "affected",
"version": "6.0LTS",
"versionType": "custom"
}
]
},
{
"product": "Varnish Cache",
"vendor": "Varnish Software",
"versions": [
{
"lessThanOrEqual": "7.71",
"status": "affected",
"version": "5.x",
"versionType": "custom"
}
]
},
{
"product": "H20",
"vendor": "Fastly",
"versions": [
{
"status": "affected",
"version": "579ecfa"
}
]
},
{
"product": "Linux",
"vendor": "Wind River",
"versions": [
{
"lessThanOrEqual": "TLS25",
"status": "affected",
"version": "LTS22",
"versionType": "custom"
}
]
},
{
"product": "Enterprise Desktop",
"vendor": "SUSE Linux",
"versions": [
{
"lessThan": "15 SP7",
"status": "affected",
"version": "15 SP6",
"versionType": "custom"
}
]
},
{
"product": "Enterprise High Performance Computing",
"vendor": "SUSE Linux",
"versions": [
{
"lessThan": "15 SP7",
"status": "affected",
"version": "15 SP3",
"versionType": "custom"
}
]
},
{
"product": "Enterprise Module for Dev Tools",
"vendor": "SUSE Linux",
"versions": [
{
"lessThan": "15 SP7",
"status": "affected",
"version": "15 SP3",
"versionType": "custom"
}
]
},
{
"product": "Enterprise Module for Package Hub",
"vendor": "SUSE Linux",
"versions": [
{
"lessThan": "15 SP7",
"status": "affected",
"version": "15 SP5",
"versionType": "custom"
}
]
},
{
"product": "Enterprise Server",
"vendor": "SUSE Linux",
"versions": [
{
"lessThan": "15 SP7",
"status": "affected",
"version": "12 SP5",
"versionType": "custom"
}
]
},
{
"product": "Enterprise Server for SAP Applications",
"vendor": "SUSE Linux",
"versions": [
{
"lessThan": "15 SP7",
"status": "affected",
"version": "15 SP6",
"versionType": "custom"
}
]
},
{
"product": "SUSE Manager Server",
"vendor": "SUSE Linux",
"versions": [
{
"status": "affected",
"version": "4.3"
}
]
},
{
"product": "SUSE Manager Server LTS",
"vendor": "SUSE Linux",
"versions": [
{
"status": "affected",
"version": "4.3"
}
]
},
{
"product": "SUSE Manager Proxy",
"vendor": "SUSE Linux",
"versions": [
{
"status": "affected",
"version": "4.3"
}
]
},
{
"product": "SUSE Manager Retail Branch Server",
"vendor": "SUSE Linux",
"versions": [
{
"status": "affected",
"version": "4.3"
}
]
},
{
"product": "openSUSE Leap",
"vendor": "SUSE Linux",
"versions": [
{
"status": "affected",
"version": "15.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them\u2014using malformed frames or flow control errors\u2014an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-404 Improper Resource Shutdown or Release",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-13T18:19:45.844Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://galbarnahum.com/made-you-reset"
},
{
"url": "https://kb.cert.org/vuls/id/767506"
},
{
"url": "https://varnish-cache.org/security/VSV00017.html"
},
{
"url": "https://www.fastlystatus.com/incident/377810"
},
{
"url": "https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80"
},
{
"url": "https://support2.windriver.com/index.php?page=security-notices"
},
{
"url": "https://www.suse.com/support/kb/doc/?id=000021980"
},
{
"url": "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325"
},
{
"url": "https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "CVE-2025-8671",
"x_generator": {
"engine": "VINCE 3.0.22",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2025-8671"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2025-8671",
"datePublished": "2025-08-13T12:03:37.167Z",
"dateReserved": "2025-08-06T11:52:46.667Z",
"dateUpdated": "2025-11-04T21:15:08.215Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-8671\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2025-08-13T13:15:34.790\",\"lastModified\":\"2025-11-04T22:16:44.813\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them\u2014using malformed frames or flow control errors\u2014an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.\"},{\"lang\":\"es\",\"value\":\"Una discrepancia causada por el restablecimiento de flujos enviados por el servidor, activados por el cliente, entre las especificaciones HTTP/2 y las arquitecturas internas de algunas implementaciones de HTTP/2 puede resultar en un consumo excesivo de recursos del servidor, lo que resulta en una denegaci\u00f3n de servicio (DoS). Al abrir flujos y luego activar r\u00e1pidamente el servidor para que los restablezca (mediante tramas malformadas o errores de control de flujo), un atacante puede explotar la contabilidad incorrecta de los flujos. Los flujos restablecidos por el servidor se consideran cerrados a nivel de protocolo, aunque el procesamiento del backend contin\u00fae. Esto permite que un cliente haga que el servidor gestione un n\u00famero ilimitado de flujos simult\u00e1neos en una sola conexi\u00f3n. Esta CVE se actualizar\u00e1 a medida que se publiquen los detalles de los productos afectados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-404\"}]}],\"references\":[{\"url\":\"https://galbarnahum.com/made-you-reset\",\"source\":\"cret@cert.org\"},{\"url\":\"https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80\",\"source\":\"cret@cert.org\"},{\"url\":\"https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq\",\"source\":\"cret@cert.org\"},{\"url\":\"https://gitlab.isc.org/isc-projects/bind9/-/issues/5325\",\"source\":\"cret@cert.org\"},{\"url\":\"https://kb.cert.org/vuls/id/767506\",\"source\":\"cret@cert.org\"},{\"url\":\"https://support2.windriver.com/index.php?page=security-notices\",\"source\":\"cret@cert.org\"},{\"url\":\"https://varnish-cache.org/security/VSV00017.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.fastlystatus.com/incident/377810\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.suse.com/support/kb/doc/?id=000021980\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/08/13/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/09/18/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://deepness-lab.org/publications/madeyoureset/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/Kong/kong/discussions/14731\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/envoyproxy/envoy/issues/40739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/varnish/hitch/issues/397\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.kb.cert.org/vuls/id/767506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gitlab.isc.org/isc-projects/bind9/-/issues/5325\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/envoyproxy/envoy/issues/40739\"}, {\"url\": \"https://github.com/varnish/hitch/issues/397\"}, {\"url\": \"https://github.com/Kong/kong/discussions/14731\"}, {\"url\": \"https://deepness-lab.org/publications/madeyoureset/\"}, {\"url\": \"https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/\"}, {\"url\": \"https://www.kb.cert.org/vuls/id/767506\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/09/18/1\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/08/13/6\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T21:15:08.215Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-8671\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-13T18:34:19.913332Z\"}}}], \"references\": [{\"url\": \"https://gitlab.isc.org/isc-projects/bind9/-/issues/5325\", \"tags\": [\"exploit\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-404\", \"description\": \"CWE-404 Improper Resource Shutdown or Release\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-13T18:00:28.478Z\"}}], \"cna\": {\"title\": \"CVE-2025-8671\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"affected\": [{\"vendor\": \"SUSE Linux\", \"product\": \"Enterprise Module for Development Tools\", \"versions\": [{\"status\": \"affected\", \"version\": \"15 SP2\", \"lessThan\": \"15-SP5\", \"versionType\": \"custom\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"Enterprise High Performance Computing (HPC)\", \"versions\": [{\"status\": \"affected\", \"version\": \"15\", \"lessThan\": \"15 SP5\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Varnish Software\", \"product\": \"Varnish Enterprise\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0.x\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.0.14r4\"}]}, {\"vendor\": \"Varnish Software\", \"product\": \"Varnish Cache\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0LTS\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.014\"}]}, {\"vendor\": \"Varnish Software\", \"product\": \"Varnish Cache\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.x\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.71\"}]}, {\"vendor\": \"Fastly\", \"product\": \"H20\", \"versions\": [{\"status\": \"affected\", \"version\": \"579ecfa\"}]}, {\"vendor\": \"Wind River\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"LTS22\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"TLS25\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"Enterprise Desktop\", \"versions\": [{\"status\": \"affected\", \"version\": \"15 SP6\", \"lessThan\": \"15 SP7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"Enterprise High Performance Computing\", \"versions\": [{\"status\": \"affected\", \"version\": \"15 SP3\", \"lessThan\": \"15 SP7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"Enterprise Module for Dev Tools\", \"versions\": [{\"status\": \"affected\", \"version\": \"15 SP3\", \"lessThan\": \"15 SP7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"Enterprise Module for Package Hub\", \"versions\": [{\"status\": \"affected\", \"version\": \"15 SP5\", \"lessThan\": \"15 SP7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"Enterprise Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"12 SP5\", \"lessThan\": \"15 SP7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"Enterprise Server for SAP Applications\", \"versions\": [{\"status\": \"affected\", \"version\": \"15 SP6\", \"lessThan\": \"15 SP7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"SUSE Manager Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"SUSE Manager Server LTS\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"SUSE Manager Proxy\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"SUSE Manager Retail Branch Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3\"}]}, {\"vendor\": \"SUSE Linux\", \"product\": \"openSUSE Leap\", \"versions\": [{\"status\": \"affected\", \"version\": \"15.6\"}]}], \"references\": [{\"url\": \"https://galbarnahum.com/made-you-reset\"}, {\"url\": \"https://kb.cert.org/vuls/id/767506\"}, {\"url\": \"https://varnish-cache.org/security/VSV00017.html\"}, {\"url\": \"https://www.fastlystatus.com/incident/377810\"}, {\"url\": \"https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80\"}, {\"url\": \"https://support2.windriver.com/index.php?page=security-notices\"}, {\"url\": \"https://www.suse.com/support/kb/doc/?id=000021980\"}, {\"url\": \"https://gitlab.isc.org/isc-projects/bind9/-/issues/5325\"}, {\"url\": \"https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq\"}], \"x_generator\": {\"env\": \"prod\", \"engine\": \"VINCE 3.0.22\", \"origin\": \"https://cveawg.mitre.org/api/cve/CVE-2025-8671\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them\\u2014using malformed frames or flow control errors\\u2014an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-404 Improper Resource Shutdown or Release\"}]}], \"providerMetadata\": {\"orgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"shortName\": \"certcc\", \"dateUpdated\": \"2025-08-13T18:19:45.844Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-8671\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T21:15:08.215Z\", \"dateReserved\": \"2025-08-06T11:52:46.667Z\", \"assignerOrgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"datePublished\": \"2025-08-13T12:03:37.167Z\", \"assignerShortName\": \"certcc\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-8671
Vulnerability from fkie_nvd - Published: 2025-08-13 13:15 - Updated: 2025-11-04 22:16| URL | Tags | ||
|---|---|---|---|
| cret@cert.org | https://galbarnahum.com/made-you-reset | ||
| cret@cert.org | https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80 | ||
| cret@cert.org | https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq | ||
| cret@cert.org | https://gitlab.isc.org/isc-projects/bind9/-/issues/5325 | ||
| cret@cert.org | https://kb.cert.org/vuls/id/767506 | ||
| cret@cert.org | https://support2.windriver.com/index.php?page=security-notices | ||
| cret@cert.org | https://varnish-cache.org/security/VSV00017.html | ||
| cret@cert.org | https://www.fastlystatus.com/incident/377810 | ||
| cret@cert.org | https://www.suse.com/support/kb/doc/?id=000021980 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/08/13/6 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/09/18/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://deepness-lab.org/publications/madeyoureset/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Kong/kong/discussions/14731 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/envoyproxy/envoy/issues/40739 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/varnish/hitch/issues/397 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/767506 | ||
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://gitlab.isc.org/isc-projects/bind9/-/issues/5325 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them\u2014using malformed frames or flow control errors\u2014an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released."
},
{
"lang": "es",
"value": "Una discrepancia causada por el restablecimiento de flujos enviados por el servidor, activados por el cliente, entre las especificaciones HTTP/2 y las arquitecturas internas de algunas implementaciones de HTTP/2 puede resultar en un consumo excesivo de recursos del servidor, lo que resulta en una denegaci\u00f3n de servicio (DoS). Al abrir flujos y luego activar r\u00e1pidamente el servidor para que los restablezca (mediante tramas malformadas o errores de control de flujo), un atacante puede explotar la contabilidad incorrecta de los flujos. Los flujos restablecidos por el servidor se consideran cerrados a nivel de protocolo, aunque el procesamiento del backend contin\u00fae. Esto permite que un cliente haga que el servidor gestione un n\u00famero ilimitado de flujos simult\u00e1neos en una sola conexi\u00f3n. Esta CVE se actualizar\u00e1 a medida que se publiquen los detalles de los productos afectados."
}
],
"id": "CVE-2025-8671",
"lastModified": "2025-11-04T22:16:44.813",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-08-13T13:15:34.790",
"references": [
{
"source": "cret@cert.org",
"url": "https://galbarnahum.com/made-you-reset"
},
{
"source": "cret@cert.org",
"url": "https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80"
},
{
"source": "cret@cert.org",
"url": "https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq"
},
{
"source": "cret@cert.org",
"url": "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325"
},
{
"source": "cret@cert.org",
"url": "https://kb.cert.org/vuls/id/767506"
},
{
"source": "cret@cert.org",
"url": "https://support2.windriver.com/index.php?page=security-notices"
},
{
"source": "cret@cert.org",
"url": "https://varnish-cache.org/security/VSV00017.html"
},
{
"source": "cret@cert.org",
"url": "https://www.fastlystatus.com/incident/377810"
},
{
"source": "cret@cert.org",
"url": "https://www.suse.com/support/kb/doc/?id=000021980"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/08/13/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/09/18/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://deepness-lab.org/publications/madeyoureset/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/Kong/kong/discussions/14731"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/envoyproxy/envoy/issues/40739"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/varnish/hitch/issues/397"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.kb.cert.org/vuls/id/767506"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"url": "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-404"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
OPENSUSE-SU-2026:20461-1
Vulnerability from csaf_opensuse - Published: 2026-04-02 09:11 - Updated: 2026-04-02 09:11| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for dnsdist",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for dnsdist fixes the following issues:\n\nUpdate to dnsdist 1.9.11:\n\n- CVE-2025-8671: add mitigations for the HTTP/2 MadeYouReset attack (bsc#1253852).\n- CVE-2025-30187: denial of service via crafted DoH exchange (bsc#1250054).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-475",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20461-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1250054",
"url": "https://bugzilla.suse.com/1250054"
},
{
"category": "self",
"summary": "SUSE Bug 1253852",
"url": "https://bugzilla.suse.com/1253852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-30187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-30187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8671 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8671/"
}
],
"title": "Security update for dnsdist",
"tracking": {
"current_release_date": "2026-04-02T09:11:51Z",
"generator": {
"date": "2026-04-02T09:11:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20461-1",
"initial_release_date": "2026-04-02T09:11:51Z",
"revision_history": [
{
"date": "2026-04-02T09:11:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-160000.1.1.aarch64",
"product": {
"name": "dnsdist-1.9.11-160000.1.1.aarch64",
"product_id": "dnsdist-1.9.11-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-160000.1.1.ppc64le",
"product": {
"name": "dnsdist-1.9.11-160000.1.1.ppc64le",
"product_id": "dnsdist-1.9.11-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-160000.1.1.s390x",
"product": {
"name": "dnsdist-1.9.11-160000.1.1.s390x",
"product_id": "dnsdist-1.9.11-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-160000.1.1.x86_64",
"product": {
"name": "dnsdist-1.9.11-160000.1.1.x86_64",
"product_id": "dnsdist-1.9.11-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.aarch64"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.ppc64le"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.s390x"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-30187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-30187"
}
],
"notes": [
{
"category": "general",
"text": "In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-30187",
"url": "https://www.suse.com/security/cve/CVE-2025-30187"
},
{
"category": "external",
"summary": "SUSE Bug 1250054 for CVE-2025-30187",
"url": "https://bugzilla.suse.com/1250054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-02T09:11:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-30187"
},
{
"cve": "CVE-2025-8671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8671"
}
],
"notes": [
{
"category": "general",
"text": "A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them-using malformed frames or flow control errors-an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8671",
"url": "https://www.suse.com/security/cve/CVE-2025-8671"
},
{
"category": "external",
"summary": "SUSE Bug 1243888 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243888"
},
{
"category": "external",
"summary": "SUSE Bug 1243895 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"openSUSE Leap 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-02T09:11:51Z",
"details": "important"
}
],
"title": "CVE-2025-8671"
}
]
}
OPENSUSE-SU-2026:10219-1
Vulnerability from csaf_opensuse - Published: 2026-02-18 00:00 - Updated: 2026-02-18 00:00| URL | Category | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "dnsdist-2.0.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the dnsdist-2.0.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10219",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10219-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8671 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8671/"
}
],
"title": "dnsdist-2.0.2-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-18T00:00:00Z",
"generator": {
"date": "2026-02-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10219-1",
"initial_release_date": "2026-02-18T00:00:00Z",
"revision_history": [
{
"date": "2026-02-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-2.0.2-1.1.aarch64",
"product": {
"name": "dnsdist-2.0.2-1.1.aarch64",
"product_id": "dnsdist-2.0.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-2.0.2-1.1.ppc64le",
"product": {
"name": "dnsdist-2.0.2-1.1.ppc64le",
"product_id": "dnsdist-2.0.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-2.0.2-1.1.s390x",
"product": {
"name": "dnsdist-2.0.2-1.1.s390x",
"product_id": "dnsdist-2.0.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-2.0.2-1.1.x86_64",
"product": {
"name": "dnsdist-2.0.2-1.1.x86_64",
"product_id": "dnsdist-2.0.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-2.0.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dnsdist-2.0.2-1.1.aarch64"
},
"product_reference": "dnsdist-2.0.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-2.0.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dnsdist-2.0.2-1.1.ppc64le"
},
"product_reference": "dnsdist-2.0.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-2.0.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dnsdist-2.0.2-1.1.s390x"
},
"product_reference": "dnsdist-2.0.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-2.0.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dnsdist-2.0.2-1.1.x86_64"
},
"product_reference": "dnsdist-2.0.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-8671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8671"
}
],
"notes": [
{
"category": "general",
"text": "A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them-using malformed frames or flow control errors-an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.aarch64",
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.ppc64le",
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.s390x",
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8671",
"url": "https://www.suse.com/security/cve/CVE-2025-8671"
},
{
"category": "external",
"summary": "SUSE Bug 1243888 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243888"
},
{
"category": "external",
"summary": "SUSE Bug 1243895 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.aarch64",
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.ppc64le",
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.s390x",
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.aarch64",
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.ppc64le",
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.s390x",
"openSUSE Tumbleweed:dnsdist-2.0.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-8671"
}
]
}
OPENSUSE-SU-2025:15449-1
Vulnerability from csaf_opensuse - Published: 2025-08-15 00:00 - Updated: 2025-08-15 00:00| URL | Category | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "lighttpd-1.4.80-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the lighttpd-1.4.80-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15449",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15449-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8671 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8671/"
}
],
"title": "lighttpd-1.4.80-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-15T00:00:00Z",
"generator": {
"date": "2025-08-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15449-1",
"initial_release_date": "2025-08-15T00:00:00Z",
"revision_history": [
{
"date": "2025-08-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "lighttpd-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-1.4.80-1.1.aarch64",
"product_id": "lighttpd-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_deflate-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_deflate-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_deflate-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_magnet-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_magnet-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_magnet-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_nss-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_nss-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_nss-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_openssl-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_openssl-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_openssl-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_webdav-1.4.80-1.1.aarch64",
"product": {
"name": "lighttpd-mod_webdav-1.4.80-1.1.aarch64",
"product_id": "lighttpd-mod_webdav-1.4.80-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "lighttpd-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_nss-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_nss-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_nss-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le",
"product": {
"name": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le",
"product_id": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "lighttpd-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-1.4.80-1.1.s390x",
"product_id": "lighttpd-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_deflate-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_deflate-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_deflate-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_gnutls-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_gnutls-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_gnutls-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_magnet-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_magnet-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_magnet-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_nss-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_nss-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_nss-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_openssl-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_openssl-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_openssl-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_webdav-1.4.80-1.1.s390x",
"product": {
"name": "lighttpd-mod_webdav-1.4.80-1.1.s390x",
"product_id": "lighttpd-mod_webdav-1.4.80-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "lighttpd-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-1.4.80-1.1.x86_64",
"product_id": "lighttpd-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_deflate-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_deflate-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_deflate-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_magnet-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_magnet-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_magnet-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_nss-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_nss-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_nss-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_openssl-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_openssl-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_openssl-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lighttpd-mod_webdav-1.4.80-1.1.x86_64",
"product": {
"name": "lighttpd-mod_webdav-1.4.80-1.1.x86_64",
"product_id": "lighttpd-mod_webdav-1.4.80-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_deflate-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_deflate-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_deflate-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_deflate-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_deflate-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_deflate-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_gnutls-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_gnutls-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_magnet-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_magnet-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_magnet-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_magnet-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_magnet-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_magnet-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_nss-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_nss-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_nss-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_nss-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_nss-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_nss-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_nss-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_nss-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_openssl-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_openssl-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_openssl-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_openssl-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_openssl-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_openssl-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_webdav-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.aarch64"
},
"product_reference": "lighttpd-mod_webdav-1.4.80-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.ppc64le"
},
"product_reference": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_webdav-1.4.80-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.s390x"
},
"product_reference": "lighttpd-mod_webdav-1.4.80-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lighttpd-mod_webdav-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.x86_64"
},
"product_reference": "lighttpd-mod_webdav-1.4.80-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-8671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8671"
}
],
"notes": [
{
"category": "general",
"text": "A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them\u2014using malformed frames or flow control errors\u2014an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8671",
"url": "https://www.suse.com/security/cve/CVE-2025-8671"
},
{
"category": "external",
"summary": "SUSE Bug 1243888 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243888"
},
{
"category": "external",
"summary": "SUSE Bug 1243895 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.aarch64",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.ppc64le",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.s390x",
"openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-8671"
}
]
}
SUSE-SU-2026:0888-1
Vulnerability from csaf_suse - Published: 2026-03-13 07:08 - Updated: 2026-03-13 07:08| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for dnsdist",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for dnsdist fixes the following issues:\n\nUpdate to dnsdist 1.9.11:\n\n- CVE-2025-8671: Add mitigations for the HTTP/2 MadeYouReset attack (bsc#1253852).\n- CVE-2025-30187: denial of service via crafted DoH exchange (bsc#1250054).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-888,SUSE-SLE-Module-Basesystem-15-SP7-2026-888",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0888-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0888-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260888-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0888-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024689.html"
},
{
"category": "self",
"summary": "SUSE Bug 1243566",
"url": "https://bugzilla.suse.com/1243566"
},
{
"category": "self",
"summary": "SUSE Bug 1250054",
"url": "https://bugzilla.suse.com/1250054"
},
{
"category": "self",
"summary": "SUSE Bug 1253852",
"url": "https://bugzilla.suse.com/1253852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-30187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-30187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8671 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8671/"
}
],
"title": "Security update for dnsdist",
"tracking": {
"current_release_date": "2026-03-13T07:08:03Z",
"generator": {
"date": "2026-03-13T07:08:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0888-1",
"initial_release_date": "2026-03-13T07:08:03Z",
"revision_history": [
{
"date": "2026-03-13T07:08:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-150700.3.6.1.aarch64",
"product": {
"name": "dnsdist-1.9.11-150700.3.6.1.aarch64",
"product_id": "dnsdist-1.9.11-150700.3.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-150700.3.6.1.i586",
"product": {
"name": "dnsdist-1.9.11-150700.3.6.1.i586",
"product_id": "dnsdist-1.9.11-150700.3.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-150700.3.6.1.ppc64le",
"product": {
"name": "dnsdist-1.9.11-150700.3.6.1.ppc64le",
"product_id": "dnsdist-1.9.11-150700.3.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-150700.3.6.1.s390x",
"product": {
"name": "dnsdist-1.9.11-150700.3.6.1.s390x",
"product_id": "dnsdist-1.9.11-150700.3.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-150700.3.6.1.x86_64",
"product": {
"name": "dnsdist-1.9.11-150700.3.6.1.x86_64",
"product_id": "dnsdist-1.9.11-150700.3.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-150700.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.aarch64"
},
"product_reference": "dnsdist-1.9.11-150700.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-150700.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.ppc64le"
},
"product_reference": "dnsdist-1.9.11-150700.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-150700.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.s390x"
},
"product_reference": "dnsdist-1.9.11-150700.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-150700.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.x86_64"
},
"product_reference": "dnsdist-1.9.11-150700.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-30187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-30187"
}
],
"notes": [
{
"category": "general",
"text": "In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-30187",
"url": "https://www.suse.com/security/cve/CVE-2025-30187"
},
{
"category": "external",
"summary": "SUSE Bug 1250054 for CVE-2025-30187",
"url": "https://bugzilla.suse.com/1250054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-13T07:08:03Z",
"details": "moderate"
}
],
"title": "CVE-2025-30187"
},
{
"cve": "CVE-2025-8671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8671"
}
],
"notes": [
{
"category": "general",
"text": "A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them-using malformed frames or flow control errors-an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8671",
"url": "https://www.suse.com/security/cve/CVE-2025-8671"
},
{
"category": "external",
"summary": "SUSE Bug 1243888 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243888"
},
{
"category": "external",
"summary": "SUSE Bug 1243895 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:dnsdist-1.9.11-150700.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-13T07:08:03Z",
"details": "important"
}
],
"title": "CVE-2025-8671"
}
]
}
SUSE-SU-2026:20995-1
Vulnerability from csaf_suse - Published: 2026-04-02 09:16 - Updated: 2026-04-02 09:16| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for dnsdist",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for dnsdist fixes the following issues:\n\nUpdate to dnsdist 1.9.11:\n\n- CVE-2025-8671: add mitigations for the HTTP/2 MadeYouReset attack (bsc#1253852).\n- CVE-2025-30187: denial of service via crafted DoH exchange (bsc#1250054).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-475",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20995-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20995-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620995-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20995-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045336.html"
},
{
"category": "self",
"summary": "SUSE Bug 1250054",
"url": "https://bugzilla.suse.com/1250054"
},
{
"category": "self",
"summary": "SUSE Bug 1253852",
"url": "https://bugzilla.suse.com/1253852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-30187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-30187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8671 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8671/"
}
],
"title": "Security update for dnsdist",
"tracking": {
"current_release_date": "2026-04-02T09:16:22Z",
"generator": {
"date": "2026-04-02T09:16:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20995-1",
"initial_release_date": "2026-04-02T09:16:22Z",
"revision_history": [
{
"date": "2026-04-02T09:16:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-160000.1.1.aarch64",
"product": {
"name": "dnsdist-1.9.11-160000.1.1.aarch64",
"product_id": "dnsdist-1.9.11-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-160000.1.1.s390x",
"product": {
"name": "dnsdist-1.9.11-160000.1.1.s390x",
"product_id": "dnsdist-1.9.11-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsdist-1.9.11-160000.1.1.x86_64",
"product": {
"name": "dnsdist-1.9.11-160000.1.1.x86_64",
"product_id": "dnsdist-1.9.11-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.aarch64"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.s390x"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.aarch64"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.s390x"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsdist-1.9.11-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
},
"product_reference": "dnsdist-1.9.11-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-30187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-30187"
}
],
"notes": [
{
"category": "general",
"text": "In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-30187",
"url": "https://www.suse.com/security/cve/CVE-2025-30187"
},
{
"category": "external",
"summary": "SUSE Bug 1250054 for CVE-2025-30187",
"url": "https://bugzilla.suse.com/1250054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-02T09:16:22Z",
"details": "moderate"
}
],
"title": "CVE-2025-30187"
},
{
"cve": "CVE-2025-8671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8671"
}
],
"notes": [
{
"category": "general",
"text": "A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them-using malformed frames or flow control errors-an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8671",
"url": "https://www.suse.com/security/cve/CVE-2025-8671"
},
{
"category": "external",
"summary": "SUSE Bug 1243888 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243888"
},
{
"category": "external",
"summary": "SUSE Bug 1243895 for CVE-2025-8671",
"url": "https://bugzilla.suse.com/1243895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dnsdist-1.9.11-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:dnsdist-1.9.11-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-02T09:16:22Z",
"details": "important"
}
],
"title": "CVE-2025-8671"
}
]
}
WID-SEC-W-2025-1830
Vulnerability from csaf_certbund - Published: 2025-08-13 22:00 - Updated: 2025-12-16 23:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "http/2 ist das HyperText Transfer Protocol in Version 2.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in verschiednen http/2 Implementierungen ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1830 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1830.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1830 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1830"
},
{
"category": "external",
"summary": "Gal Bar Nahum\u0027s Blog - MadeYouReset Series vom 2025-08-13",
"url": "https://galbarnahum.com/made-you-reset"
},
{
"category": "external",
"summary": "CERT/CC VU#767506 vom 2025-08-13",
"url": "https://kb.cert.org/vuls/id/767506"
},
{
"category": "external",
"summary": "Varnish Security Advisory VSV00017 vom 2025-08-13",
"url": "https://varnish-cache.org/security/VSV00017.html"
},
{
"category": "external",
"summary": "Mailing List OSS Security vom 2025-08-13",
"url": "https://seclists.org/oss-sec/2025/q3/95"
},
{
"category": "external",
"summary": "Tomcat 9 Security vom 2025-08-13",
"url": "https://tomcat.apache.org/security-9.html"
},
{
"category": "external",
"summary": "Tomcat 10 Security vom 2025-08-13",
"url": "https://tomcat.apache.org/security-10.html"
},
{
"category": "external",
"summary": "Tomcat 11 Security vom 2025-08-13",
"url": "https://tomcat.apache.org/security-11.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13686 vom 2025-08-13",
"url": "https://access.redhat.com/errata/RHSA-2025:13686"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13685 vom 2025-08-14",
"url": "https://access.redhat.com/errata/RHSA-2025:13685"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15449-1 vom 2025-08-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LD37QPQBLKIFMKWJXACHGPA7WALFCOM7/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14004 vom 2025-08-19",
"url": "https://access.redhat.com/errata/RHSA-2025:14004"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14008 vom 2025-08-19",
"url": "https://access.redhat.com/errata/RHSA-2025:14008"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14182 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14182"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14177 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14177"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14180 vom 2025-08-21",
"url": "https://access.redhat.com/errata/RHSA-2025:14180"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-MMXM-8W33-WC4H vom 2025-08-20",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-mmxm-8w33-wc4h"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14179 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14179"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14178 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14178"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14183 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14183"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14177 vom 2025-08-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-14177.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14197 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14197"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14181 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14181"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14181 vom 2025-08-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-14181.html"
},
{
"category": "external",
"summary": "New Varnish Cache releases (7.7.3, 7.6.5 and 6.0.16) vom 2025-08-20",
"url": "https://varnish-cache.org/lists/pipermail/varnish-announce/2025-August/000771.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14178 vom 2025-08-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-14178.html"
},
{
"category": "external",
"summary": "PoC CVE-2025-8671 vom 2025-08-24",
"url": "https://github.com/abiyeenzo/CVE-2025-8671"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15483-1 vom 2025-08-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXDF5TMMN4LHEDWLII7MMDPWQR5D6UWU/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14179 vom 2025-08-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-14179.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15490-1 vom 2025-08-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HVS2SK75HFDIVZCEQSOAOL6TTJCJFJZK/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15491-1 vom 2025-08-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PFPY4ZCVL2NZMRDOWWAY4ZBXIIA663BF/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15489-1 vom 2025-08-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBHMT4B4D7HRMDPQJYDEV5UUSG7LVAHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02992-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022280.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02993-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022294.html"
},
{
"category": "external",
"summary": "Camunda Security Notice 144 vom 2025-08-28",
"url": "https://docs.camunda.org/security/notices/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03006-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022326.html"
},
{
"category": "external",
"summary": "ATOSS Sicherheitsmitteilung: Apache Tomcat-Sicherheitsl\u00fccken vom 2025-08-28",
"url": "https://www.atoss.ch/de-ch/sicherheit/security-news"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14911 vom 2025-08-28",
"url": "https://access.redhat.com/errata/RHSA-2025:14911"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03024-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022345.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03021-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022331.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02993-2 vom 2025-09-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022373.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02993-2 vom 2025-09-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WDVRXONEUUASOWSNXL4RQLFHU45FFDH6/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14919 vom 2025-09-03",
"url": "https://access.redhat.com/errata/RHSA-2025:14919"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2TOMCAT9-2025-022 vom 2025-09-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS2TOMCAT9-2025-022.html"
},
{
"category": "external",
"summary": "PDFreactor Release Notes vom 2025-09-05",
"url": "https://www.pdfreactor.com/pdfreactor-12-3-now-available/"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:14177 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:14177"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03114-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022412.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15612 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15612"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15697 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15697"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4299 vom 2025-09-14",
"url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00014.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6005 vom 2025-09-19",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00169.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6006 vom 2025-09-19",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00170.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16407 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16407"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16457 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16457"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16459 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16459"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16460 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16460"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16462 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16462"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16454 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16454"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16456 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16456"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16455 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16455"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7246095 vom 2025-09-29",
"url": "https://www.ibm.com/support/pages/node/7246095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16989 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16989"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17317 vom 2025-10-02",
"url": "https://access.redhat.com/errata/RHSA-2025:17317"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17318 vom 2025-10-02",
"url": "https://access.redhat.com/errata/RHSA-2025:17318"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20251003-0005 vom 2025-10-03",
"url": "https://security.netapp.com/advisory/NTAP-20251003-0005"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17299 vom 2025-10-02",
"url": "https://access.redhat.com/errata/RHSA-2025:17299"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17298 vom 2025-10-02",
"url": "https://access.redhat.com/errata/RHSA-2025:17298"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17567 vom 2025-10-08",
"url": "https://access.redhat.com/errata/RHSA-2025:17567"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7247555 vom 2025-10-09",
"url": "https://www.ibm.com/support/pages/node/7247555"
},
{
"category": "external",
"summary": "HCL Security Bulletin vom 2025-10-15",
"url": "https://support.hcl-software.com/csm?id=kb_article\u0026sysparm_article=KB0124532"
},
{
"category": "external",
"summary": "Atlassian Security Bulletin",
"url": "https://jira.atlassian.com/browse/BAM-26217"
},
{
"category": "external",
"summary": "Atlassian Security Bulletin",
"url": "https://confluence.atlassian.com/security/security-bulletin-october-21-2025-1652920034.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18989 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18989"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7248973 vom 2025-10-23",
"url": "https://www.ibm.com/support/pages/node/7248973"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19094 vom 2025-10-24",
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249276 vom 2025-10-27",
"url": "https://www.ibm.com/support/pages/node/7249276"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-2FF6E32273 vom 2025-10-30",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-2ff6e32273"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-018 vom 2025-11-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/11/Xerox-Security-Bulletin-XRX25-018-Xerox-FreeFlow-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "Atlassian Security Bulletin - November 18 2025",
"url": "https://confluence.atlassian.com/security/security-bulletin-november-18-2025-1671463469.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7252039 vom 2025-11-20",
"url": "https://www.ibm.com/support/pages/node/7252039"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7252567 vom 2025-11-26",
"url": "https://www.ibm.com/support/pages/node/7252567"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-365 vom 2025-12-01",
"url": "https://www.dell.com/support/kbdoc/de-de/000397532/dsa-2025-365-security-update-for-dell-networker-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "Camunda Security Notices vom 2025-12-01",
"url": "https://docs.camunda.org/security/notices/"
},
{
"category": "external",
"summary": "PDFreactor ReleaseNotes vom 2025-12-04",
"url": "https://www.pdfreactor.com/pdfreactor-12-4/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22924 vom 2025-12-09",
"url": "https://access.redhat.com/errata/RHSA-2025:22924"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22925 vom 2025-12-09",
"url": "https://access.redhat.com/errata/RHSA-2025:22925"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23417 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23417"
}
],
"source_lang": "en-US",
"title": "http/2 Implementierungen: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-12-16T23:00:00.000+00:00",
"generator": {
"date": "2025-12-17T09:45:01.068+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1830",
"initial_release_date": "2025-08-13T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-13T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat, Open Source, Oracle Linux und European Union Vulnerability Database aufgenommen"
},
{
"date": "2025-08-21T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "6",
"summary": "PoC aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-01T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-09-21T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von IBM und Red Hat aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat und NetApp aufgenommen"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Atlassian aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von IBM und Red Hat aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-29T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "41"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "ATOSS Staff Efficiency Suite",
"product": {
"name": "ATOSS Staff Efficiency Suite",
"product_id": "T041371",
"product_identification_helper": {
"cpe": "cpe:/a:atoss:staff_efficiency_suite:-"
}
}
}
],
"category": "vendor",
"name": "ATOSS"
},
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c11.0.10",
"product": {
"name": "Apache Tomcat \u003c11.0.10",
"product_id": "1821869"
}
},
{
"category": "product_version",
"name": "11.0.10",
"product": {
"name": "Apache Tomcat 11.0.10",
"product_id": "1821869-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:apache:tomcat:11.0.10"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.108",
"product": {
"name": "Apache Tomcat \u003c9.0.108",
"product_id": "1821870"
}
},
{
"category": "product_version",
"name": "9.0.108",
"product": {
"name": "Apache Tomcat 9.0.108",
"product_id": "1821870-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:apache:tomcat:9.0.108"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.1.44",
"product": {
"name": "Apache Tomcat \u003c10.1.44",
"product_id": "T046241"
}
},
{
"category": "product_version",
"name": "10.1.44",
"product": {
"name": "Apache Tomcat 10.1.44",
"product_id": "T046241-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:apache:tomcat:10.1.44"
}
}
}
],
"category": "product_name",
"name": "Tomcat"
}
],
"category": "vendor",
"name": "Apache"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.2.8",
"product": {
"name": "Atlassian Bamboo \u003c10.2.8",
"product_id": "T048023"
}
},
{
"category": "product_version",
"name": "10.2.8",
"product": {
"name": "Atlassian Bamboo 10.2.8",
"product_id": "T048023-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:10.2.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.5",
"product": {
"name": "Atlassian Bamboo \u003c11.0.5",
"product_id": "T048024"
}
},
{
"category": "product_version",
"name": "11.0.5",
"product": {
"name": "Atlassian Bamboo 11.0.5",
"product_id": "T048024-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:11.0.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.6.17",
"product": {
"name": "Atlassian Bamboo \u003c9.6.17",
"product_id": "T048025"
}
},
{
"category": "product_version",
"name": "9.6.17",
"product": {
"name": "Atlassian Bamboo 9.6.17",
"product_id": "T048025-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:9.6.17"
}
}
}
],
"category": "product_name",
"name": "Bamboo"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.2",
"product": {
"name": "Atlassian Bitbucket \u003c10.0.2",
"product_id": "T048675"
}
},
{
"category": "product_version",
"name": "10.0.2",
"product": {
"name": "Atlassian Bitbucket 10.0.2",
"product_id": "T048675-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:10.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.19.25 (LTS)",
"product": {
"name": "Atlassian Bitbucket \u003c8.19.25 (LTS)",
"product_id": "T048676"
}
},
{
"category": "product_version",
"name": "8.19.25 (LTS)",
"product": {
"name": "Atlassian Bitbucket 8.19.25 (LTS)",
"product_id": "T048676-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:8.19.25_%28lts%29"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.4.13 (LTS)",
"product": {
"name": "Atlassian Bitbucket \u003c9.4.13 (LTS)",
"product_id": "T048677"
}
},
{
"category": "product_version",
"name": "9.4.13 (LTS)",
"product": {
"name": "Atlassian Bitbucket 9.4.13 (LTS)",
"product_id": "T048677-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:9.4.13_%28lts%29"
}
}
}
],
"category": "product_name",
"name": "Bitbucket"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c11.1.1",
"product": {
"name": "Atlassian Jira \u003c11.1.1",
"product_id": "T048027"
}
},
{
"category": "product_version",
"name": "11.1.1",
"product": {
"name": "Atlassian Jira 11.1.1",
"product_id": "T048027-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:11.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.3.12",
"product": {
"name": "Atlassian Jira \u003c10.3.12",
"product_id": "T048028"
}
},
{
"category": "product_version",
"name": "10.3.12",
"product": {
"name": "Atlassian Jira 10.3.12",
"product_id": "T048028-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:10.3.12"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.12.28",
"product": {
"name": "Atlassian Jira \u003c9.12.28",
"product_id": "T048029"
}
},
{
"category": "product_version",
"name": "9.12.28",
"product": {
"name": "Atlassian Jira 9.12.28",
"product_id": "T048029-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:9.12.28"
}
}
}
],
"category": "product_name",
"name": "Jira"
}
],
"category": "vendor",
"name": "Atlassian"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Management Console \u003c19.13.0.2",
"product": {
"name": "Dell NetWorker Management Console \u003c19.13.0.2",
"product_id": "T048961"
}
},
{
"category": "product_version",
"name": "Management Console 19.13.0.2",
"product": {
"name": "Dell NetWorker Management Console 19.13.0.2",
"product_id": "T048961-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:management_console__19.13.0.2"
}
}
},
{
"category": "product_version_range",
"name": "Management Web UI \u003c19.13.0.2",
"product": {
"name": "Dell NetWorker Management Web UI \u003c19.13.0.2",
"product_id": "T048962"
}
},
{
"category": "product_version",
"name": "Management Web UI 19.13.0.2",
"product": {
"name": "Dell NetWorker Management Web UI 19.13.0.2",
"product_id": "T048962-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:management_web_ui__19.13.0.2"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.4.58",
"product": {
"name": "Eclipse Jetty \u003c9.4.58",
"product_id": "T046367"
}
},
{
"category": "product_version",
"name": "9.4.58",
"product": {
"name": "Eclipse Jetty 9.4.58",
"product_id": "T046367-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:eclipse:jetty:9.4.58"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.0.26",
"product": {
"name": "Eclipse Jetty \u003c10.0.26",
"product_id": "T046368"
}
},
{
"category": "product_version",
"name": "10.0.26",
"product": {
"name": "Eclipse Jetty 10.0.26",
"product_id": "T046368-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:eclipse:jetty:10.0.26"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.26",
"product": {
"name": "Eclipse Jetty \u003c11.0.26",
"product_id": "T046369"
}
},
{
"category": "product_version",
"name": "11.0.26",
"product": {
"name": "Eclipse Jetty 11.0.26",
"product_id": "T046369-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:eclipse:jetty:11.0.26"
}
}
},
{
"category": "product_version_range",
"name": "\u003c12.0.25",
"product": {
"name": "Eclipse Jetty \u003c12.0.25",
"product_id": "T046370"
}
},
{
"category": "product_version",
"name": "12.0.25",
"product": {
"name": "Eclipse Jetty 12.0.25",
"product_id": "T046370-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:eclipse:jetty:12.0.25"
}
}
},
{
"category": "product_version_range",
"name": "\u003c12.1.0.beta3",
"product": {
"name": "Eclipse Jetty \u003c12.1.0.beta3",
"product_id": "T046371"
}
},
{
"category": "product_version",
"name": "12.1.0.beta3",
"product": {
"name": "Eclipse Jetty 12.1.0.beta3",
"product_id": "T046371-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:eclipse:jetty:12.1.0.beta3"
}
}
}
],
"category": "product_name",
"name": "Jetty"
}
],
"category": "vendor",
"name": "Eclipse"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c25.09.17.0",
"product": {
"name": "HCL Commerce \u003c25.09.17.0",
"product_id": "T047719"
}
},
{
"category": "product_version",
"name": "25.09.17.0",
"product": {
"name": "HCL Commerce 25.09.17.0",
"product_id": "T047719-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:hcltechsw:commerce:25.09.17.0"
}
}
}
],
"category": "product_name",
"name": "Commerce"
}
],
"category": "vendor",
"name": "HCL"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM InfoSphere Information Server",
"product": {
"name": "IBM InfoSphere Information Server",
"product_id": "T035705",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_information_server:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "10.1.0.0-10.1.0.6",
"product": {
"name": "IBM Integration Bus 10.1.0.0-10.1.0.6",
"product_id": "T047549",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6"
}
}
}
],
"category": "product_name",
"name": "Integration Bus"
},
{
"category": "product_name",
"name": "IBM Operational Decision Manager",
"product": {
"name": "IBM Operational Decision Manager",
"product_id": "T005180",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:operational_decision_manager:-"
}
}
},
{
"category": "product_name",
"name": "IBM Power Hardware Management Console",
"product": {
"name": "IBM Power Hardware Management Console",
"product_id": "5114",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:-"
}
}
},
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.2.3.4",
"product": {
"name": "IBM Storage Scale \u003c5.2.3.4",
"product_id": "T048104"
}
},
{
"category": "product_version",
"name": "5.2.3.4",
"product": {
"name": "IBM Storage Scale 5.2.3.4",
"product_id": "T048104-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:5.2.3.4"
}
}
}
],
"category": "product_name",
"name": "Storage Scale"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T016960",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Optimize \u003c3.15.7",
"product": {
"name": "Open Source Camunda Optimize \u003c3.15.7",
"product_id": "T046585"
}
},
{
"category": "product_version",
"name": "Optimize 3.15.7",
"product": {
"name": "Open Source Camunda Optimize 3.15.7",
"product_id": "T046585-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:camunda:camunda:optimize_3.15.7"
}
}
},
{
"category": "product_version_range",
"name": "Optimize \u003c3.14.8",
"product": {
"name": "Open Source Camunda Optimize \u003c3.14.8",
"product_id": "T046586"
}
},
{
"category": "product_version",
"name": "Optimize 3.14.8",
"product": {
"name": "Open Source Camunda Optimize 3.14.8",
"product_id": "T046586-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:camunda:camunda:optimize_3.14.8"
}
}
},
{
"category": "product_version_range",
"name": "Optimize \u003c3.13.19",
"product": {
"name": "Open Source Camunda Optimize \u003c3.13.19",
"product_id": "T046587"
}
},
{
"category": "product_version",
"name": "Optimize 3.13.19",
"product": {
"name": "Open Source Camunda Optimize 3.13.19",
"product_id": "T046587-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:camunda:camunda:optimize_3.13.19"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.24.1",
"product": {
"name": "Open Source Camunda \u003c7.24.1",
"product_id": "T048978"
}
},
{
"category": "product_version",
"name": "7.24.1",
"product": {
"name": "Open Source Camunda 7.24.1",
"product_id": "T048978-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:camunda:camunda:7.24.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.23.7",
"product": {
"name": "Open Source Camunda \u003c7.23.7",
"product_id": "T048979"
}
},
{
"category": "product_version",
"name": "7.23.7",
"product": {
"name": "Open Source Camunda 7.23.7",
"product_id": "T048979-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:camunda:camunda:7.23.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.22.10",
"product": {
"name": "Open Source Camunda \u003c7.22.10",
"product_id": "T048980"
}
},
{
"category": "product_version",
"name": "7.22.10",
"product": {
"name": "Open Source Camunda 7.22.10",
"product_id": "T048980-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:camunda:camunda:7.22.10"
}
}
}
],
"category": "product_name",
"name": "Camunda"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.6.4",
"product": {
"name": "Open Source Varnish HTTP Cache \u003c7.6.4",
"product_id": "T046242"
}
},
{
"category": "product_version",
"name": "7.6.4",
"product": {
"name": "Open Source Varnish HTTP Cache 7.6.4",
"product_id": "T046242-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:varnish_http_accelerator_integration_project:varnish:7.6.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.7.2",
"product": {
"name": "Open Source Varnish HTTP Cache \u003c7.7.2",
"product_id": "T046243"
}
},
{
"category": "product_version",
"name": "7.7.2",
"product": {
"name": "Open Source Varnish HTTP Cache 7.7.2",
"product_id": "T046243-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:varnish_http_accelerator_integration_project:varnish:7.7.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.0.15",
"product": {
"name": "Open Source Varnish HTTP Cache \u003c6.0.15",
"product_id": "T046244"
}
},
{
"category": "product_version",
"name": "6.0.15",
"product": {
"name": "Open Source Varnish HTTP Cache 6.0.15",
"product_id": "T046244-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:varnish_http_accelerator_integration_project:varnish:6.0.15"
}
}
}
],
"category": "product_name",
"name": "Varnish HTTP Cache"
},
{
"category": "product_name",
"name": "Open Source lighttpd",
"product": {
"name": "Open Source lighttpd",
"product_id": "T000812",
"product_identification_helper": {
"cpe": "cpe:/a:lighttpd:lighttpd:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.3",
"product": {
"name": "RealObjects PDFreactor \u003c12.3",
"product_id": "T046765"
}
},
{
"category": "product_version",
"name": "12.3",
"product": {
"name": "RealObjects PDFreactor 12.3",
"product_id": "T046765-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:realobjects:pdfreactor:12.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c12.4",
"product": {
"name": "RealObjects PDFreactor \u003c12.4",
"product_id": "T049106"
}
},
{
"category": "product_version",
"name": "12.4",
"product": {
"name": "RealObjects PDFreactor 12.4",
"product_id": "T049106-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:realobjects:pdfreactor:12.4"
}
}
}
],
"category": "product_name",
"name": "PDFreactor"
}
],
"category": "vendor",
"name": "RealObjects"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Apache Camel 1",
"product": {
"name": "Red Hat Enterprise Linux Apache Camel 1",
"product_id": "T044468",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:apache_camel_1"
}
}
},
{
"category": "product_version",
"name": "Quarkus 3.15.6.SP1",
"product": {
"name": "Red Hat Enterprise Linux Quarkus 3.15.6.SP1",
"product_id": "T046330",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:quarkus_3.15.6.sp1"
}
}
},
{
"category": "product_version",
"name": "Quarkus 3.20.2.SP1",
"product": {
"name": "Red Hat Enterprise Linux Quarkus 3.20.2.SP1",
"product_id": "T046331",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:quarkus_3.20.2.sp1"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "Camel for Spring Boot 1",
"product": {
"name": "Red Hat Integration Camel for Spring Boot 1",
"product_id": "T035240",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:integration:camel_for_spring_boot_1"
}
}
}
],
"category": "product_name",
"name": "Integration"
},
{
"branches": [
{
"category": "product_version",
"name": "Middleware 1",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform Middleware 1",
"product_id": "T046944",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:middleware_1"
}
}
}
],
"category": "product_name",
"name": "JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.2",
"product": {
"name": "Red Hat JBoss Web Server \u003c6.1.2",
"product_id": "T046251"
}
},
{
"category": "product_version",
"name": "6.1.2",
"product": {
"name": "Red Hat JBoss Web Server 6.1.2",
"product_id": "T046251-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.1.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.8.6",
"product": {
"name": "Red Hat JBoss Web Server \u003c5.8.6",
"product_id": "T049206"
}
},
{
"category": "product_version",
"name": "5.8.6",
"product": {
"name": "Red Hat JBoss Web Server 5.8.6",
"product_id": "T049206-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8.6"
}
}
}
],
"category": "product_name",
"name": "JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Specification http/2",
"product": {
"name": "Specification http/2",
"product_id": "T030386",
"product_identification_helper": {
"cpe": "cpe:/a:ietf:http2:-"
}
}
}
],
"category": "vendor",
"name": "Specification"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T035098",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-48989",
"product_status": {
"known_affected": [
"T035098",
"T047719",
"T004914",
"T048979",
"T048978",
"T021415",
"398363",
"T049106",
"T035705",
"5114",
"T016960",
"T046944",
"T041371",
"2951",
"T002207",
"T027843",
"T046587",
"T046585",
"T048962",
"T046586",
"T048961",
"T030386",
"T046370",
"67646",
"T046371",
"T047549",
"T000812",
"1821870",
"T046330",
"T005180",
"T046331",
"T046251",
"T049206",
"T048677",
"T048676",
"T048675",
"T035240",
"T032255",
"1821869",
"74185",
"T046369",
"T046765",
"T044468",
"T046242",
"T048025",
"T046243",
"T048024",
"T048023",
"T048980",
"T046241",
"T046367",
"T048029",
"T046368",
"T048028",
"T046244",
"T048027",
"T048104",
"T048301"
]
},
"release_date": "2025-08-13T22:00:00.000+00:00",
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-5115",
"product_status": {
"known_affected": [
"T035098",
"T047719",
"T004914",
"T048979",
"T048978",
"T021415",
"398363",
"T049106",
"T035705",
"5114",
"T016960",
"T046944",
"T041371",
"2951",
"T002207",
"T027843",
"T046587",
"T046585",
"T048962",
"T046586",
"T048961",
"T030386",
"T046370",
"67646",
"T046371",
"T047549",
"T000812",
"1821870",
"T046330",
"T005180",
"T046331",
"T046251",
"T049206",
"T048677",
"T048676",
"T048675",
"T035240",
"T032255",
"1821869",
"74185",
"T046369",
"T046765",
"T044468",
"T046242",
"T048025",
"T046243",
"T048024",
"T048023",
"T048980",
"T046241",
"T046367",
"T048029",
"T046368",
"T048028",
"T046244",
"T048027",
"T048104",
"T048301"
]
},
"release_date": "2025-08-13T22:00:00.000+00:00",
"title": "CVE-2025-5115"
},
{
"cve": "CVE-2025-55163",
"product_status": {
"known_affected": [
"T035098",
"T047719",
"T004914",
"T048979",
"T048978",
"T021415",
"398363",
"T049106",
"T035705",
"5114",
"T016960",
"T046944",
"T041371",
"2951",
"T002207",
"T027843",
"T046587",
"T046585",
"T048962",
"T046586",
"T048961",
"T030386",
"T046370",
"67646",
"T046371",
"T047549",
"T000812",
"1821870",
"T046330",
"T005180",
"T046331",
"T046251",
"T049206",
"T048677",
"T048676",
"T048675",
"T035240",
"T032255",
"1821869",
"74185",
"T046369",
"T046765",
"T044468",
"T046242",
"T048025",
"T046243",
"T048024",
"T048023",
"T048980",
"T046241",
"T046367",
"T048029",
"T046368",
"T048028",
"T046244",
"T048027",
"T048104",
"T048301"
]
},
"release_date": "2025-08-13T22:00:00.000+00:00",
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-8671",
"product_status": {
"known_affected": [
"T035098",
"T047719",
"T004914",
"T048979",
"T048978",
"T021415",
"398363",
"T049106",
"T035705",
"5114",
"T016960",
"T046944",
"T041371",
"2951",
"T002207",
"T027843",
"T046587",
"T046585",
"T048962",
"T046586",
"T048961",
"T030386",
"T046370",
"67646",
"T046371",
"T047549",
"T000812",
"1821870",
"T046330",
"T005180",
"T046331",
"T046251",
"T049206",
"T048677",
"T048676",
"T048675",
"T035240",
"T032255",
"1821869",
"74185",
"T046369",
"T046765",
"T044468",
"T046242",
"T048025",
"T046243",
"T048024",
"T048023",
"T048980",
"T046241",
"T046367",
"T048029",
"T046368",
"T048028",
"T046244",
"T048027",
"T048104",
"T048301"
]
},
"release_date": "2025-08-13T22:00:00.000+00:00",
"title": "CVE-2025-8671"
}
]
}
rustsec-2025-0070
Vulnerability from osv_rustsec
Pingora deployments using versions prior to 0.6.0 that include HTTP/2 server support may be affected by the vulnerability described in CVE-2025-8671. Under certain conditions, Pingora applications may allocate buffers before the HTTP/2 reset and resulting stream cancellation is processed by the server. Repeated resets can force excessive memory consumption and lead to denial-of-service.
On affected versions, malicious clients could trigger unusually high memory consumption, which may result in service instability or process termination.
This issue is addressed by ensuring Pingora uses patched versions of HTTP/2 dependencies that include reset-handling safeguards to release connection resources before excessive memory buildup. Users are requested to upgrade to versions >= 0.6.0, which incorporates the required fixes.
{
"affected": [
{
"database_specific": {
"categories": [
"denial-of-service"
],
"cvss": null,
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "pingora-core",
"purl": "pkg:cargo/pingora-core"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0-0"
},
{
"fixed": "0.6.0"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2025-8671"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "Pingora deployments using versions prior to 0.6.0 that include HTTP/2 server support may be affected by the vulnerability described in CVE-2025-8671. Under certain conditions, Pingora applications may allocate buffers before the HTTP/2 reset and resulting stream cancellation is processed by the server. Repeated resets can force excessive memory consumption and lead to denial-of-service.\n\nOn affected versions, malicious clients could trigger unusually high memory consumption, which may result in service instability or process termination.\n\nThis issue is addressed by ensuring Pingora uses patched versions of HTTP/2 dependencies that include reset-handling safeguards to release connection resources before excessive memory buildup. Users are requested to upgrade to versions \u003e= 0.6.0, which incorporates the required fixes.",
"id": "RUSTSEC-2025-0070",
"modified": "2025-09-18T07:10:31Z",
"published": "2025-09-17T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/pingora-core"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0070.html"
},
{
"type": "ADVISORY",
"url": "https://github.com/cloudflare/pingora/security/advisories/GHSA-393w-9x6h-8gc7"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8671"
},
{
"type": "WEB",
"url": "https://blog.cloudflare.com/madeyoureset-an-http-2-vulnerability-thwarted-by-rapid-reset-mitigations/"
}
],
"related": [],
"severity": [],
"summary": "Pingora MadeYouReset HTTP/2 vulnerability"
}
BDU:2025-09848
Vulnerability from fstec - Published: 13.08.2025{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 4729b66 (H2O)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u0440\u043e\u0432\u043d\u044f \u0432\u0435\u0431-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 (WAF);\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f (\u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f, \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438) \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (VPN).\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-09848",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-8671",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "H2O",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 HTTP/2, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 HTTP/2 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80\nhttps://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq\nhttps://galbarnahum.com/posts/made-you-reset-intro",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.