ELSA-2022-6778

ELSA-2022-6778 - bind security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-10-05

Description


[32:9.11.36-3.1]
- Fix memory leak in ECDSA verify processing (CVE-2022-38177)
- Fix memory leak in EdDSA verify processing (CVE-2022-38178)


Related CVEs


CVE-2022-38177
CVE-2022-38178

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 8 (aarch64) bind-9.11.36-3.el8_6.1.src.rpma6d0bf8a39a07da8c22f1a16dfd51b5d-
bind-9.11.36-3.el8_6.1.aarch64.rpm2df2ac94f01b5c66791149e0fa225fb3-
bind-chroot-9.11.36-3.el8_6.1.aarch64.rpm24a6ca1054a285928839222352fc44fc-
bind-devel-9.11.36-3.el8_6.1.aarch64.rpmc9df2b6a9db720105571001bc26f6343-
bind-export-devel-9.11.36-3.el8_6.1.aarch64.rpm8e792a78c464c97a92942b92319705ee-
bind-export-libs-9.11.36-3.el8_6.1.aarch64.rpm40b61c3b6a8a752ac071129f4950b5d0-
bind-libs-9.11.36-3.el8_6.1.aarch64.rpm05efd147b925c82b9ab84e870f2db980-
bind-libs-lite-9.11.36-3.el8_6.1.aarch64.rpm07309745e7364ce2608d978d43d71161-
bind-license-9.11.36-3.el8_6.1.noarch.rpm3a9483d1daf3d92511bcc6cea0aa062d-
bind-lite-devel-9.11.36-3.el8_6.1.aarch64.rpm4f2d21af3cb86de5c1d20e78d67db9cd-
bind-pkcs11-9.11.36-3.el8_6.1.aarch64.rpmb9e845b86b5afa6670e333c280b95624-
bind-pkcs11-devel-9.11.36-3.el8_6.1.aarch64.rpmada6029bfef3a017d5dd1cbcd97565db-
bind-pkcs11-libs-9.11.36-3.el8_6.1.aarch64.rpm00262631ef0a05b162cb8493e842a63a-
bind-pkcs11-utils-9.11.36-3.el8_6.1.aarch64.rpm6502a78131ad7b04e0aeeb7b65ad3cb4-
bind-sdb-9.11.36-3.el8_6.1.aarch64.rpmf6e54ac0e12471b31381963154c6a1fc-
bind-sdb-chroot-9.11.36-3.el8_6.1.aarch64.rpm4ffe79f7e2748f35d38cab1b553cc56b-
bind-utils-9.11.36-3.el8_6.1.aarch64.rpm605b7b146eff05d6d7e0abf62d159809-
python3-bind-9.11.36-3.el8_6.1.noarch.rpm276110759297e4539269dd9c1cbf7f32-
Oracle Linux 8 (x86_64) bind-9.11.36-3.el8_6.1.src.rpma6d0bf8a39a07da8c22f1a16dfd51b5d-
bind-9.11.36-3.el8_6.1.x86_64.rpm6ef3b393bf460598394fb5c5b8d390ae-
bind-chroot-9.11.36-3.el8_6.1.x86_64.rpm968f737c08c69a5dfcb9d2ab80c1263a-
bind-devel-9.11.36-3.el8_6.1.i686.rpm6e93ebb796a971d3311781feebf66f22-
bind-devel-9.11.36-3.el8_6.1.x86_64.rpma300f35e38aa2ab98f40578b6148dd2e-
bind-export-devel-9.11.36-3.el8_6.1.i686.rpm7f64562f9d7b83501ee90b22932daaee-
bind-export-devel-9.11.36-3.el8_6.1.x86_64.rpma7bfa0fff53c983515061a6bce8d1416-
bind-export-libs-9.11.36-3.el8_6.1.i686.rpm412a1d0a26254e464f336f3c9d06714a-
bind-export-libs-9.11.36-3.el8_6.1.x86_64.rpmc442393269b1b35cab09bd2561b2db1e-
bind-libs-9.11.36-3.el8_6.1.i686.rpm42c97ff7574bd4b50020fdd110e2170a-
bind-libs-9.11.36-3.el8_6.1.x86_64.rpm14a1dea706ca5a3b2bad461756a141b9-
bind-libs-lite-9.11.36-3.el8_6.1.i686.rpmf6586acffe1c4a2b1029534af3c35df3-
bind-libs-lite-9.11.36-3.el8_6.1.x86_64.rpma28bc7e383750f45f7f44753e167a848-
bind-license-9.11.36-3.el8_6.1.noarch.rpm3a9483d1daf3d92511bcc6cea0aa062d-
bind-lite-devel-9.11.36-3.el8_6.1.i686.rpm4b27d059cf64876566f8358393a0bf03-
bind-lite-devel-9.11.36-3.el8_6.1.x86_64.rpm9926220771c1b35477ab2132200aa513-
bind-pkcs11-9.11.36-3.el8_6.1.x86_64.rpm480ad6dae83d5935e167e3e26f4bbdfc-
bind-pkcs11-devel-9.11.36-3.el8_6.1.i686.rpm24246056eb153d8963ab5c2a601b668f-
bind-pkcs11-devel-9.11.36-3.el8_6.1.x86_64.rpm56cb4378f4273a057acebd95ebe1d7f7-
bind-pkcs11-libs-9.11.36-3.el8_6.1.i686.rpme98789c4f2bffceeb5fcefe5377c8488-
bind-pkcs11-libs-9.11.36-3.el8_6.1.x86_64.rpm7d2f96e43be3830f29dd365b944f1e4d-
bind-pkcs11-utils-9.11.36-3.el8_6.1.x86_64.rpmca52bff5a8e3996c6d892742f3d70446-
bind-sdb-9.11.36-3.el8_6.1.x86_64.rpmda88a3a65916744e45b8f4928dc91491-
bind-sdb-chroot-9.11.36-3.el8_6.1.x86_64.rpmb7c746a479ac24363f08d3577392d045-
bind-utils-9.11.36-3.el8_6.1.x86_64.rpmf47f875c3bda72e10c874a68bd26258a-
python3-bind-9.11.36-3.el8_6.1.noarch.rpm276110759297e4539269dd9c1cbf7f32-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete