ELBA-2025-12190

ELBA-2025-12190 - bind bug fix and enhancement update

Type:BUG
Impact:NA
Release Date:2025-07-29

Description


[9.16.23-31.0.1]
- Fix warning when changing device file permissions [Orabug: 36518580]

[32:9.16.23-31]
- Add runtime tunable limit by environment NAMED_MAXADDITIONAL (RHEL-84006)

[32:9.16.23-30]
- Change additional NS to be served partially (RHEL-84006)

[32:9.18.23-29]
- Prevent name.c:670 attributes assertion failed (RHEL-30407)
- Add extra checks for relative names

[32:9.16.23-28]
- Fix test backport changes

[32:9.16.23-27]
- Limit additional section records CPU processing (CVE-2024-11187)

[32:9.16.23-26]
- Switch to autopatch changes applying

[32:9.16.23-25]
- Bump version above RHEL 9.5

[32:9.16.23-24]
- Minor fix of reclimit test backport (CVE-2024-1737)

[32:9.16.23-23]
- Backport addition of max-records-per-type and max-records-per-type options

[32:9.16.23-22]
- Resolve CVE-2024-1975
- Resolve CVE-2024-1737
- Resolve CVE-2024-4076
- Add ability to change runtime limits for max types and records per name

[32:9.16.23-21]
- Increase size of hazard pointer array (RHEL-39131)

[32:9.16.23-20]
- Ensure bind CVE fixes hits public Stream repository

[32:9.11.36-19]
- Ensure incompatible bind-dyndb-ldap is not accepted

[32:9.16.23-18]
- Prevent crashing at masterformat system test (CVE-2023-6516)

[32:9.16.23-17]
- Import tests for large DNS messages fix
- Add downstream change complementing CVE-2023-50387

[32:9.16.23-16]
- Prevent increased CPU load on large DNS messages (CVE-2023-4408)
- Prevent assertion failure when nxdomain-redirect is used with
RFC 1918 reverse zones (CVE-2023-5517)
- Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
- Specific recursive query patterns may lead to an out-of-memory
condition (CVE-2023-6516)
- Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
CVE-2023-50868)

[32:9.16.23-15]
- Update addresses of b.root-servers.net (RHEL-18188)

[32:9.16.23-14]
- Limit the amount of recursion possible in control channel (CVE-2023-3341)




Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) bind-9.16.23-31.0.1.el9_6.src.rpmd32848efbac4e85d3b3faa8e348896aa12659fc3d2c58cd9a99dd2cd06d94b45-ol9_aarch64_appstream
bind-9.16.23-31.0.1.el9_6.src.rpmd32848efbac4e85d3b3faa8e348896aa12659fc3d2c58cd9a99dd2cd06d94b45-ol9_aarch64_codeready_builder
bind-9.16.23-31.0.1.el9_6.aarch64.rpmf0c6bf902e45ab291531efeae1a3ce5c9ad0f749edb44917f0a6c5ac99aef45d-ol9_aarch64_appstream
bind-chroot-9.16.23-31.0.1.el9_6.aarch64.rpm16bcc38e3e517900034d796e2bec5fb716172e802df923259bfb54f843c6ae0b-ol9_aarch64_appstream
bind-devel-9.16.23-31.0.1.el9_6.aarch64.rpm0375446fea69a1f9b574fe874f8b37e3c8ce5fd926bd656d793ffa67c8c40a02-ol9_aarch64_codeready_builder
bind-dnssec-doc-9.16.23-31.0.1.el9_6.noarch.rpm12dd3c9303af89a3c7cf014e881fe37e4a1a476a248c262bc19050f3472809cf-ol9_aarch64_appstream
bind-dnssec-utils-9.16.23-31.0.1.el9_6.aarch64.rpm38f5425c68f55ba40b69eac720e7ae810519c4d85286199579ec216fb37801f6-ol9_aarch64_appstream
bind-doc-9.16.23-31.0.1.el9_6.noarch.rpmce13f53a3f20d5630bd661d14f51556d773e18e0512c73fbc94649b0751e92f8-ol9_aarch64_codeready_builder
bind-libs-9.16.23-31.0.1.el9_6.aarch64.rpm785fb1558c5bb5f3c81fe7142c8d31159bba151b6f6150e3c15ac3b7115b7c4f-ol9_aarch64_appstream
bind-license-9.16.23-31.0.1.el9_6.noarch.rpm8ff0d8ca5433e247f0f9f70f5dcfe046565cbdb522a7400eac89771e915aa72c-ol9_aarch64_appstream
bind-utils-9.16.23-31.0.1.el9_6.aarch64.rpm5a017edd37192ceb3638e3d770637a3eb1d989c50bf7ff59e6dfc5f956281b7a-ol9_aarch64_appstream
python3-bind-9.16.23-31.0.1.el9_6.noarch.rpmd8e3d34bb1e0deacb37bb21659820a876dfaca8be1c6aa0221a0019fb8cd4a43-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) bind-9.16.23-31.0.1.el9_6.src.rpmd32848efbac4e85d3b3faa8e348896aa12659fc3d2c58cd9a99dd2cd06d94b45-ol9_x86_64_appstream
bind-9.16.23-31.0.1.el9_6.src.rpmd32848efbac4e85d3b3faa8e348896aa12659fc3d2c58cd9a99dd2cd06d94b45-ol9_x86_64_codeready_builder
bind-9.16.23-31.0.1.el9_6.x86_64.rpm6bdb7522bf7ab4ff0ab8f013e7f008f69993f0757102beb098ce0aaa52f04570-ol9_x86_64_appstream
bind-chroot-9.16.23-31.0.1.el9_6.x86_64.rpma70c0756435261b35e02865f3ff52e226f1a7c50a39e3686316beb9000fedd67-ol9_x86_64_appstream
bind-devel-9.16.23-31.0.1.el9_6.i686.rpm02cf884bfec82fe2c9330691afa2c3085a12e509c98245e7087cffc992ffe2a0-ol9_x86_64_codeready_builder
bind-devel-9.16.23-31.0.1.el9_6.x86_64.rpm5ba905bd2cf078b3afc3e3b6e9546a0d24918d12a972ed0af1ec2c3037535fc6-ol9_x86_64_codeready_builder
bind-dnssec-doc-9.16.23-31.0.1.el9_6.noarch.rpm12dd3c9303af89a3c7cf014e881fe37e4a1a476a248c262bc19050f3472809cf-ol9_x86_64_appstream
bind-dnssec-utils-9.16.23-31.0.1.el9_6.x86_64.rpmf83c03a5b6dee070405824bdf34433c2898989db43a87092aabdbeb78f44a6ce-ol9_x86_64_appstream
bind-doc-9.16.23-31.0.1.el9_6.noarch.rpmce13f53a3f20d5630bd661d14f51556d773e18e0512c73fbc94649b0751e92f8-ol9_x86_64_codeready_builder
bind-libs-9.16.23-31.0.1.el9_6.i686.rpmaef7bff00742945247ccc43a34595156ae1fc93cdb703e003c0cfd508fcdf3b6-ol9_x86_64_codeready_builder
bind-libs-9.16.23-31.0.1.el9_6.x86_64.rpmc6d284408cedd46e5ac81d05109b381e9c463c45303daaa35294862c57364038-ol9_x86_64_appstream
bind-license-9.16.23-31.0.1.el9_6.noarch.rpm8ff0d8ca5433e247f0f9f70f5dcfe046565cbdb522a7400eac89771e915aa72c-ol9_x86_64_appstream
bind-utils-9.16.23-31.0.1.el9_6.x86_64.rpmc98dcea507d24aa6e22a5472f842138454081981c9a940e5d7ef20577a56d72e-ol9_x86_64_appstream
python3-bind-9.16.23-31.0.1.el9_6.noarch.rpmd8e3d34bb1e0deacb37bb21659820a876dfaca8be1c6aa0221a0019fb8cd4a43-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete