vulnerability
SUSE: CVE-2020-13529: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:A/AC:M/Au:N/C:N/I:N/A:P) | May 10, 2021 | Aug 24, 2021 | Aug 24, 2021 |
Severity
3
CVSS
(AV:A/AC:M/Au:N/C:N/I:N/A:P)
Published
May 10, 2021
Added
Aug 24, 2021
Modified
Aug 24, 2021
Description
An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.
Solutions
suse-upgrade-libsystemd0suse-upgrade-libsystemd0-32bitsuse-upgrade-libudev-develsuse-upgrade-libudev-devel-32bitsuse-upgrade-libudev1suse-upgrade-libudev1-32bitsuse-upgrade-nss-myhostnamesuse-upgrade-nss-myhostname-32bitsuse-upgrade-nss-mymachinessuse-upgrade-nss-mymachines-32bitsuse-upgrade-nss-resolvesuse-upgrade-nss-systemdsuse-upgrade-systemdsuse-upgrade-systemd-32bitsuse-upgrade-systemd-containersuse-upgrade-systemd-coredumpsuse-upgrade-systemd-develsuse-upgrade-systemd-docsuse-upgrade-systemd-journal-remotesuse-upgrade-systemd-langsuse-upgrade-systemd-loggersuse-upgrade-systemd-networksuse-upgrade-systemd-sysvinitsuse-upgrade-udev
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.