ELSA-2022-6763

ELSA-2022-6763 - bind security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2022-10-04

Description


[32:9.16.23-1.1]
- Fix possible serve-stale related crash (CVE-2022-3080)
- Fix memory leak in ECDSA verify processing (CVE-2022-38177)
- Fix memory leak in EdDSA verify processing (CVE-2022-38178)


Related CVEs


CVE-2022-38177
CVE-2022-38178
CVE-2022-3080

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) bind-9.16.23-1.el9_0.1.src.rpm5efc013c08caac512511fd26f29d8c338acdccbefee71c22e8ad425c50db9faa-ol9_aarch64_appstream
bind-9.16.23-1.el9_0.1.src.rpm5efc013c08caac512511fd26f29d8c338acdccbefee71c22e8ad425c50db9faa-ol9_aarch64_codeready_builder
bind-9.16.23-1.el9_0.1.aarch64.rpma41f600a151fbf37243c494c21285f7d27b528945832a2ad6c3366536261fd92-ol9_aarch64_appstream
bind-chroot-9.16.23-1.el9_0.1.aarch64.rpm483be6c0a96d5c9015ab8de491dd2265d3be309dd3a8039723604714000898bc-ol9_aarch64_appstream
bind-devel-9.16.23-1.el9_0.1.aarch64.rpm0504dc80f3d385934113316c12bdd9edc53ed9252b6ceeb33e7b9792225041ab-ol9_aarch64_codeready_builder
bind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpm5da639fb68c72516d37c830d937b559fe190304ad8447138bcb732a3768bd70b-ol9_aarch64_appstream
bind-dnssec-utils-9.16.23-1.el9_0.1.aarch64.rpmc14d269a09a57e3e2f5bfd28c517654cb7407b0a1936623fbb67cf6bdbf078c2-ol9_aarch64_appstream
bind-libs-9.16.23-1.el9_0.1.aarch64.rpme1e52dfe7d47621626ef2ac6082c618ca2d06228136b301978104ea7435a4be2-ol9_aarch64_appstream
bind-license-9.16.23-1.el9_0.1.noarch.rpm9b3a0577ee1c85c2a0f1b86fd7b7b7a835fd5823fe880e16c7526f00e54ad085-ol9_aarch64_appstream
bind-utils-9.16.23-1.el9_0.1.aarch64.rpm97fd468f1464d168afac2227a7c5ba558916f739708a2f33d01cba945228248c-ol9_aarch64_appstream
python3-bind-9.16.23-1.el9_0.1.noarch.rpm0fffaa798a70d757af2afbd58805e9dde002856c572bf678289dce9f4640a0ef-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) bind-9.16.23-1.el9_0.1.src.rpm5efc013c08caac512511fd26f29d8c338acdccbefee71c22e8ad425c50db9faa-ol9_x86_64_appstream
bind-9.16.23-1.el9_0.1.src.rpm5efc013c08caac512511fd26f29d8c338acdccbefee71c22e8ad425c50db9faa-ol9_x86_64_codeready_builder
bind-9.16.23-1.el9_0.1.x86_64.rpm21e7e22684e9ec94f0be6131447aa0d5c8bb0db2c618632cba2ff326cf957e2a-ol9_x86_64_appstream
bind-chroot-9.16.23-1.el9_0.1.x86_64.rpmf2efb3f87094adc05125014e8d21fc9a77c5d1f4e9151f4ea262064cd744c68c-ol9_x86_64_appstream
bind-devel-9.16.23-1.el9_0.1.i686.rpm0ea49ed96f1db0494dccbc013cb5125de573cb416fcb7ae5886fe5333731de0a-ol9_x86_64_codeready_builder
bind-devel-9.16.23-1.el9_0.1.x86_64.rpm47de78d28824bf485bac0811425885501267723afb05494f86d7243488f1cb46-ol9_x86_64_codeready_builder
bind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpm5da639fb68c72516d37c830d937b559fe190304ad8447138bcb732a3768bd70b-ol9_x86_64_appstream
bind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm4c2fa741f8f215b2b65acf99c63efe0dd5ac82471e34d9fa8c76622a39651b59-ol9_x86_64_appstream
bind-libs-9.16.23-1.el9_0.1.i686.rpm2cc67a467319093cc11559b4d417e56ad23f9a6284a361f9624af3f53aa36686-ol9_x86_64_codeready_builder
bind-libs-9.16.23-1.el9_0.1.x86_64.rpm665e465a4c9e2ffa483416bca49b681b3796c5b2a9bc183d54eda1ae8018e23e-ol9_x86_64_appstream
bind-license-9.16.23-1.el9_0.1.noarch.rpm9b3a0577ee1c85c2a0f1b86fd7b7b7a835fd5823fe880e16c7526f00e54ad085-ol9_x86_64_appstream
bind-utils-9.16.23-1.el9_0.1.x86_64.rpmb1e43a4850b95e00cfca29f73eb04f9fd229968ec5545d19883a99da3803b2e6-ol9_x86_64_appstream
python3-bind-9.16.23-1.el9_0.1.noarch.rpm0fffaa798a70d757af2afbd58805e9dde002856c572bf678289dce9f4640a0ef-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete