An update for bind is now available for openEuler-22.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1505 Final 1.0 1.0 2023-08-12 Initial 2023-08-12 2023-08-12 openEuler SA Tool V1.0 2023-08-12 bind security update An update for bind is now available for openEuler-22.03-LTS-SP2. BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. Security Fix(es): Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.(CVE-2023-2828) An update for bind is now available for openEuler-22.03-LTS-SP2. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High bind https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1505 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-2828 https://nvd.nist.gov/vuln/detail/CVE-2023-2828 openEuler-22.03-LTS-SP2 bind-pkcs11-devel-9.16.23-18.oe2203sp2.aarch64.rpm bind-9.16.23-18.oe2203sp2.aarch64.rpm bind-libs-9.16.23-18.oe2203sp2.aarch64.rpm bind-pkcs11-9.16.23-18.oe2203sp2.aarch64.rpm bind-debuginfo-9.16.23-18.oe2203sp2.aarch64.rpm bind-chroot-9.16.23-18.oe2203sp2.aarch64.rpm bind-pkcs11-utils-9.16.23-18.oe2203sp2.aarch64.rpm bind-utils-9.16.23-18.oe2203sp2.aarch64.rpm bind-dnssec-utils-9.16.23-18.oe2203sp2.aarch64.rpm bind-devel-9.16.23-18.oe2203sp2.aarch64.rpm bind-debugsource-9.16.23-18.oe2203sp2.aarch64.rpm bind-pkcs11-libs-9.16.23-18.oe2203sp2.aarch64.rpm bind-license-9.16.23-18.oe2203sp2.noarch.rpm python3-bind-9.16.23-18.oe2203sp2.noarch.rpm bind-dnssec-doc-9.16.23-18.oe2203sp2.noarch.rpm bind-9.16.23-18.oe2203sp2.src.rpm bind-utils-9.16.23-18.oe2203sp2.x86_64.rpm bind-chroot-9.16.23-18.oe2203sp2.x86_64.rpm bind-debuginfo-9.16.23-18.oe2203sp2.x86_64.rpm bind-pkcs11-libs-9.16.23-18.oe2203sp2.x86_64.rpm bind-libs-9.16.23-18.oe2203sp2.x86_64.rpm bind-pkcs11-9.16.23-18.oe2203sp2.x86_64.rpm bind-pkcs11-devel-9.16.23-18.oe2203sp2.x86_64.rpm bind-9.16.23-18.oe2203sp2.x86_64.rpm bind-pkcs11-utils-9.16.23-18.oe2203sp2.x86_64.rpm bind-devel-9.16.23-18.oe2203sp2.x86_64.rpm bind-debugsource-9.16.23-18.oe2203sp2.x86_64.rpm bind-dnssec-utils-9.16.23-18.oe2203sp2.x86_64.rpm Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded.This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1. 2023-08-12 CVE-2023-2828 openEuler-22.03-LTS-SP2 High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H bind security update 2023-08-12 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1505