MGASA-2023-0303

Source
https://advisories.mageia.org/MGASA-2023-0303.html
Import Source
https://advisories.mageia.org/MGASA-2023-0303.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0303
Related
Published
2023-10-27T21:49:40Z
Modified
2023-10-27T20:23:45Z
Summary
Updated bind packages fix security vulnerabilities
Details

The code that processes control channel messages sent to named calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing named to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. (CVE-2023-3341)

A flaw in the networking code handling DNS-over-TLS queries may cause named to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. (CVE-2023-4236)

References
Credits

Affected packages