An update for bind is now available for openEuler-22.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1505
Final
1.0
1.0
2023-08-12
Initial
2023-08-12
2023-08-12
openEuler SA Tool V1.0
2023-08-12
bind security update
An update for bind is now available for openEuler-22.03-LTS-SP2.
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols.
Security Fix(es):
Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.
It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded.
This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.(CVE-2023-2828)
An update for bind is now available for openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
bind
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1505
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-2828
https://nvd.nist.gov/vuln/detail/CVE-2023-2828
openEuler-22.03-LTS-SP2
bind-pkcs11-devel-9.16.23-18.oe2203sp2.aarch64.rpm
bind-9.16.23-18.oe2203sp2.aarch64.rpm
bind-libs-9.16.23-18.oe2203sp2.aarch64.rpm
bind-pkcs11-9.16.23-18.oe2203sp2.aarch64.rpm
bind-debuginfo-9.16.23-18.oe2203sp2.aarch64.rpm
bind-chroot-9.16.23-18.oe2203sp2.aarch64.rpm
bind-pkcs11-utils-9.16.23-18.oe2203sp2.aarch64.rpm
bind-utils-9.16.23-18.oe2203sp2.aarch64.rpm
bind-dnssec-utils-9.16.23-18.oe2203sp2.aarch64.rpm
bind-devel-9.16.23-18.oe2203sp2.aarch64.rpm
bind-debugsource-9.16.23-18.oe2203sp2.aarch64.rpm
bind-pkcs11-libs-9.16.23-18.oe2203sp2.aarch64.rpm
bind-license-9.16.23-18.oe2203sp2.noarch.rpm
python3-bind-9.16.23-18.oe2203sp2.noarch.rpm
bind-dnssec-doc-9.16.23-18.oe2203sp2.noarch.rpm
bind-9.16.23-18.oe2203sp2.src.rpm
bind-utils-9.16.23-18.oe2203sp2.x86_64.rpm
bind-chroot-9.16.23-18.oe2203sp2.x86_64.rpm
bind-debuginfo-9.16.23-18.oe2203sp2.x86_64.rpm
bind-pkcs11-libs-9.16.23-18.oe2203sp2.x86_64.rpm
bind-libs-9.16.23-18.oe2203sp2.x86_64.rpm
bind-pkcs11-9.16.23-18.oe2203sp2.x86_64.rpm
bind-pkcs11-devel-9.16.23-18.oe2203sp2.x86_64.rpm
bind-9.16.23-18.oe2203sp2.x86_64.rpm
bind-pkcs11-utils-9.16.23-18.oe2203sp2.x86_64.rpm
bind-devel-9.16.23-18.oe2203sp2.x86_64.rpm
bind-debugsource-9.16.23-18.oe2203sp2.x86_64.rpm
bind-dnssec-utils-9.16.23-18.oe2203sp2.x86_64.rpm
Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded.This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
2023-08-12
CVE-2023-2828
openEuler-22.03-LTS-SP2
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
bind security update
2023-08-12
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1505