ELSA-2023-5689

ELSA-2023-5689 - bind security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2023-10-13

Description


[32:9.16.23-11.2]
- stack exhaustion in control channel code may lead to DoS (CVE-2023-3341)


Related CVEs


CVE-2023-3341

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) bind-9.16.23-11.el9_2.2.src.rpm2e137287508c1f7549bd23b9201bbe118da696b23b9781ff554b139e6e70bb92-ol9_aarch64_appstream
bind-9.16.23-11.el9_2.2.src.rpm2e137287508c1f7549bd23b9201bbe118da696b23b9781ff554b139e6e70bb92-ol9_aarch64_codeready_builder
bind-9.16.23-11.el9_2.2.aarch64.rpm7527173598a3ed94d374af562b480064adbe2af433ab9a6fb4927299fb151588-ol9_aarch64_appstream
bind-chroot-9.16.23-11.el9_2.2.aarch64.rpmc8c4dec2a9e443097f1488e5f76550e110ba6734022ea807aefe6e7ebb86321d-ol9_aarch64_appstream
bind-devel-9.16.23-11.el9_2.2.aarch64.rpm090835ce5ee394e76a81a55c45681fb4fbb955ea6b54fcc182f77c0457b9e9f3-ol9_aarch64_codeready_builder
bind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpm92be9643da4616c01c4cc21a958fc2726886a59648202125416c08cf5d8358dc-ol9_aarch64_appstream
bind-dnssec-utils-9.16.23-11.el9_2.2.aarch64.rpme4b0a4de2518224704f18c18cc9440f3d4e4a4dc2275388f7bb6d6b96cea2e37-ol9_aarch64_appstream
bind-doc-9.16.23-11.el9_2.2.noarch.rpm7e9cf25c5f2bc1228a5a80396307e7fdf34ab77fc1e143243eccabb4d8be7ec9-ol9_aarch64_codeready_builder
bind-libs-9.16.23-11.el9_2.2.aarch64.rpmbd8e34da9def20e178f281e35bfef625602cc91c6116b88dbafd8f563f5b9c04-ol9_aarch64_appstream
bind-license-9.16.23-11.el9_2.2.noarch.rpm5e6b2a9eb57ec7df4592113c351de470cf8b03adba0408ff29551a62a2da500d-ol9_aarch64_appstream
bind-utils-9.16.23-11.el9_2.2.aarch64.rpm4e051d87aff8856d68e08a5cb9f3cebdafc07fd2da0f43e438ad2f30853e63cd-ol9_aarch64_appstream
python3-bind-9.16.23-11.el9_2.2.noarch.rpm204f68b8e74655325e26536a7c5814803bfb9b28645df7005df2eac02978329d-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) bind-9.16.23-11.el9_2.2.src.rpm2e137287508c1f7549bd23b9201bbe118da696b23b9781ff554b139e6e70bb92-ol9_x86_64_appstream
bind-9.16.23-11.el9_2.2.src.rpm2e137287508c1f7549bd23b9201bbe118da696b23b9781ff554b139e6e70bb92-ol9_x86_64_codeready_builder
bind-9.16.23-11.el9_2.2.x86_64.rpmcaaa4cd7f704e1b2394ac7593cf004e57cc8332e9403801281384ab5e765e5da-ol9_x86_64_appstream
bind-chroot-9.16.23-11.el9_2.2.x86_64.rpm749db9a853a1d06a2f96e3c6a3088539990152f789cff8040c9547ea5e57985b-ol9_x86_64_appstream
bind-devel-9.16.23-11.el9_2.2.i686.rpm719a9ccd8007305c82069a7b1bf29fac41ff55524b92062b3e6cdec4d0e978c7-ol9_x86_64_codeready_builder
bind-devel-9.16.23-11.el9_2.2.x86_64.rpm215ccbaa628e602c2f7aa476981d53656b6ae7be266ad05701224ec0310643e7-ol9_x86_64_codeready_builder
bind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpm92be9643da4616c01c4cc21a958fc2726886a59648202125416c08cf5d8358dc-ol9_x86_64_appstream
bind-dnssec-utils-9.16.23-11.el9_2.2.x86_64.rpmaf5f70859253a30d8a6049fb3ed87608d4963c257ce15ce8b6d8a70546f2e183-ol9_x86_64_appstream
bind-doc-9.16.23-11.el9_2.2.noarch.rpm7e9cf25c5f2bc1228a5a80396307e7fdf34ab77fc1e143243eccabb4d8be7ec9-ol9_x86_64_codeready_builder
bind-libs-9.16.23-11.el9_2.2.i686.rpm6e990ce569c5f2fa26960ffdee61d91d2079de944a2bb86b0122c0f2af3ce09d-ol9_x86_64_codeready_builder
bind-libs-9.16.23-11.el9_2.2.x86_64.rpm6d512fb84560ddd5d63fb4b7668ba178a7ef59befcd92d3aa68a913e8987a5f3-ol9_x86_64_appstream
bind-license-9.16.23-11.el9_2.2.noarch.rpm5e6b2a9eb57ec7df4592113c351de470cf8b03adba0408ff29551a62a2da500d-ol9_x86_64_appstream
bind-utils-9.16.23-11.el9_2.2.x86_64.rpm25ac2c03c07ad414c464222a71cce617bacc737b053bc49b451f8e15e9b39eb3-ol9_x86_64_appstream
python3-bind-9.16.23-11.el9_2.2.noarch.rpm204f68b8e74655325e26536a7c5814803bfb9b28645df7005df2eac02978329d-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete