MGASA-2024-0038

Source
https://advisories.mageia.org/MGASA-2024-0038.html
Import Source
https://advisories.mageia.org/MGASA-2024-0038.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0038
Related
Published
2024-02-15T18:36:07Z
Modified
2024-02-15T18:25:28Z
Summary
Updated bind packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities: Parsing large DNS messages may cause excessive CPU load. (CVE-2023-4408) Querying RFC 1918 reverse zones may cause an assertion failure when "nxdomain-redirect" is enabled. (CVE-2023-5517) Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution. (CVE-2023-5679) KeyTrap - Extreme CPU consumption in DNSSEC validator. (CVE-2023-50387) Preparing an NSEC3 closest encloser proof can exhaust CPU resources. (CVE-2023-50868)

References
Credits

Affected packages

Mageia:9 / bind

Package

Name
bind
Purl
pkg:rpm/mageia/bind?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.18.15-2.3.mga9

Ecosystem specific

{
    "section": "core"
}