OESA-2024-2014

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2014
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-2014.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-2014
Upstream
Published
2024-08-23T11:08:52Z
Modified
2025-08-12T05:39:51.557659Z
Summary
bind security update
Details

Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols and provides an openly redistributable reference implementation of the major components of the Domain Name System. This package includes the components to operate a DNS server.

Security Fix(es):

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.(CVE-2023-50868)

A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.(CVE-2024-0760)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP3 / bind

Package

Name
bind
Purl
pkg:rpm/openEuler/bind&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.16.23-23.oe2203sp3

Ecosystem specific

{
    "noarch": [
        "bind-dnssec-doc-9.16.23-23.oe2203sp3.noarch.rpm",
        "bind-license-9.16.23-23.oe2203sp3.noarch.rpm",
        "python3-bind-9.16.23-23.oe2203sp3.noarch.rpm"
    ],
    "aarch64": [
        "bind-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-chroot-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-debuginfo-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-debugsource-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-devel-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-dnssec-utils-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-libs-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-pkcs11-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-pkcs11-devel-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-pkcs11-libs-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-pkcs11-utils-9.16.23-23.oe2203sp3.aarch64.rpm",
        "bind-utils-9.16.23-23.oe2203sp3.aarch64.rpm"
    ],
    "src": [
        "bind-9.16.23-23.oe2203sp3.src.rpm"
    ],
    "x86_64": [
        "bind-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-chroot-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-debuginfo-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-debugsource-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-devel-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-dnssec-utils-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-libs-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-pkcs11-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-pkcs11-devel-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-pkcs11-libs-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-pkcs11-utils-9.16.23-23.oe2203sp3.x86_64.rpm",
        "bind-utils-9.16.23-23.oe2203sp3.x86_64.rpm"
    ]
}