Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.32604
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.32604
<patchinfo incident="32604"> <issue tracker="cve" id="2023-5517"/> <issue tracker="cve" id="2023-6516"/> <issue tracker="cve" id="2023-50387"/> <issue tracker="cve" id="2023-5679"/> <issue tracker="cve" id="2023-50868"/> <issue tracker="cve" id="2023-4408"/> <issue tracker="bnc" id="1219854">VUL-0: CVE-2023-6516: bind: Specific recursive query patterns may lead to an out-of-memory condition</issue> <issue tracker="bnc" id="1219826">VUL-0: CVE-2023-50868: unbound, bind, pdns, dnsmasq: Denial Of Service while trying to validate specially crafted DNSSEC responses</issue> <issue tracker="bnc" id="1219852">VUL-0: CVE-2023-5517: bind: Querying RFC 1918 reverse zones may cause an assertion failure when "nxdomain-redirect" is enabled</issue> <issue tracker="bnc" id="1219851">VUL-0: CVE-2023-4408: bind: Parsing large DNS messages may cause excessive CPU load</issue> <issue tracker="bnc" id="1219853">VUL-0: CVE-2023-5679: bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution</issue> <issue tracker="bnc" id="1219823">VUL-0: CVE-2023-50387 : unbound, pdns, bind, dnsmasq: Denial Of Service while trying to validate specially crafted DNSSEC responses</issue> <packager>jcronenberg</packager> <rating>important</rating> <category>security</category> <summary>Security update for bind</summary> <description>This update for bind fixes the following issues: Update to release 9.16.48: Feature Changes: * The IP addresses for B.ROOT-SERVERS.NET have been updated to 170.247.170.2 and 2801:1b8:10::b. Security Fixes: * Validating DNS messages containing a lot of DNSSEC signatures could cause excessive CPU load, leading to a denial-of-service condition. This has been fixed. (CVE-2023-50387) [bsc#1219823] * Preparing an NSEC3 closest encloser proof could cause excessive CPU load, leading to a denial-of-service condition. This has been fixed. (CVE-2023-50868) [bsc#1219826] * Parsing DNS messages with many different names could cause excessive CPU load. This has been fixed. (CVE-2023-4408) [bsc#1219851] * Specific queries could cause named to crash with an assertion failure when nxdomain-redirect was enabled. This has been fixed. (CVE-2023-5517) [bsc#1219852] * A bad interaction between DNS64 and serve-stale could cause named to crash with an assertion failure, when both of these features were enabled. This has been fixed. (CVE-2023-5679) [bsc#1219853] * Query patterns that continuously triggered cache database maintenance could cause an excessive amount of memory to be allocated, exceeding max-cache-size and potentially leading to all available memory on the host running named being exhausted. This has been fixed. (CVE-2023-6516) [bsc#1219854] Removed Features: * Support for using AES as the DNS COOKIE algorithm (cookie-algorithm aes;) has been deprecated and will be removed in a future release. Please use the current default, SipHash-2-4, instead. </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor