{"schema_version":"1.7.2","id":"OESA-2026-1601","modified":"2026-03-15T05:56:08Z","published":"2026-03-15T05:56:08Z","upstream":["CVE-2025-40778"],"summary":"dhcp security update","details":"The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.\r\n\r\nSecurity Fix(es):\n\nUnder certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache.\nThis issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.(CVE-2025-40778)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"dhcp","purl":"pkg:rpm/openEuler/dhcp&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.3-11.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["dhcp-4.4.3-11.oe2203sp4.aarch64.rpm","dhcp-debuginfo-4.4.3-11.oe2203sp4.aarch64.rpm","dhcp-debugsource-4.4.3-11.oe2203sp4.aarch64.rpm","dhcp-devel-4.4.3-11.oe2203sp4.aarch64.rpm"],"noarch":["dhcp-help-4.4.3-11.oe2203sp4.noarch.rpm"],"src":["dhcp-4.4.3-11.oe2203sp4.src.rpm"],"x86_64":["dhcp-4.4.3-11.oe2203sp4.x86_64.rpm","dhcp-debuginfo-4.4.3-11.oe2203sp4.x86_64.rpm","dhcp-debugsource-4.4.3-11.oe2203sp4.x86_64.rpm","dhcp-devel-4.4.3-11.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1601"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40778"}],"database_specific":{"severity":"High"}}
