ELSA-2024-5390

ELSA-2024-5390 - bind9.16 security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2024-08-14

Description


[32:9.16.23-0.22]
- Minor fix of reclimit test backport (CVE-2024-1737)

[32:9.16.23-0.21]
- Backport addition of max-records-per-type and max-records-per-type options
(CVE-2024-1737)

[32:9.16.23-0.20]
- Resolve CVE-2024-1975
- Resolve CVE-2024-1737
- Resolve CVE-2024-4076
- Add ability to change runtime limits for max types and records per name

[32:9.16.23-0.19]
- Add few more explicit conflicts with bind subpackages (RHEL-2208)

[32:9.16.23-0.18]
- Prevent crashing at masterformat system test (CVE-2023-6516)

[32:9.16.23-0.17]
- Prevent increased CPU load on large DNS messages (CVE-2023-4408)
- Prevent assertion failure when nxdomain-redirect is used with
RFC 1918 reverse zones (CVE-2023-5517)
- Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
- Specific recursive query patterns may lead to an out-of-memory
condition (CVE-2023-6516)
- Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
CVE-2023-50868)
- Import tests for large DNS messages fix
- Add downstream change complementing CVE-2023-50387


Related CVEs


CVE-2024-1975
CVE-2024-1737
CVE-2024-4076

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) bind9.16-9.16.23-0.22.el8_10.src.rpm64f7ed0d70e1526edbd907359c229419-ol8_aarch64_appstream
bind9.16-9.16.23-0.22.el8_10.src.rpm64f7ed0d70e1526edbd907359c229419-ol8_aarch64_codeready_builder
bind9.16-9.16.23-0.22.el8_10.aarch64.rpm99922ac8d065fb21ff7209e2de0d8e41-ol8_aarch64_appstream
bind9.16-chroot-9.16.23-0.22.el8_10.aarch64.rpmf70fcae347d311d7eca8519edccf7d14-ol8_aarch64_appstream
bind9.16-devel-9.16.23-0.22.el8_10.aarch64.rpm16600aa67815dab9d62e0c6788e6b366-ol8_aarch64_codeready_builder
bind9.16-dnssec-utils-9.16.23-0.22.el8_10.aarch64.rpm96c51c52ec5707dcff999526096490b5-ol8_aarch64_appstream
bind9.16-doc-9.16.23-0.22.el8_10.noarch.rpm1e33687f692f318e6dac2720a36849cf-ol8_aarch64_codeready_builder
bind9.16-libs-9.16.23-0.22.el8_10.aarch64.rpm0bb65e811c4a780173cff80fd20bbd10-ol8_aarch64_appstream
bind9.16-license-9.16.23-0.22.el8_10.noarch.rpm707355a5b120c42ccb4039cd8414d78c-ol8_aarch64_appstream
bind9.16-utils-9.16.23-0.22.el8_10.aarch64.rpma0473702f120f19d25801cb69b8b47d3-ol8_aarch64_appstream
python3-bind9.16-9.16.23-0.22.el8_10.noarch.rpmb9dd8af6a840ef6ce7d392a7aef31a51-ol8_aarch64_appstream
Oracle Linux 8 (x86_64) bind9.16-9.16.23-0.22.el8_10.src.rpm64f7ed0d70e1526edbd907359c229419-ol8_x86_64_appstream
bind9.16-9.16.23-0.22.el8_10.src.rpm64f7ed0d70e1526edbd907359c229419-ol8_x86_64_codeready_builder
bind9.16-9.16.23-0.22.el8_10.x86_64.rpm8560694232434d1a7307290f1946869f-ol8_x86_64_appstream
bind9.16-chroot-9.16.23-0.22.el8_10.x86_64.rpm9ea48c579ecfa32e7891a7242e04e123-ol8_x86_64_appstream
bind9.16-devel-9.16.23-0.22.el8_10.i686.rpma5ec48291b9155de2f92e1348ce9eb2d-ol8_x86_64_codeready_builder
bind9.16-devel-9.16.23-0.22.el8_10.x86_64.rpm46c3b2d332ee6e462bfef01b4fd068c8-ol8_x86_64_codeready_builder
bind9.16-dnssec-utils-9.16.23-0.22.el8_10.x86_64.rpmebf4dfc9abdec395a837720ab1d31282-ol8_x86_64_appstream
bind9.16-doc-9.16.23-0.22.el8_10.noarch.rpm1e33687f692f318e6dac2720a36849cf-ol8_x86_64_codeready_builder
bind9.16-libs-9.16.23-0.22.el8_10.i686.rpmcb7ab3af501e42585a4ddd65385cb1ca-ol8_x86_64_codeready_builder
bind9.16-libs-9.16.23-0.22.el8_10.x86_64.rpm9835e61767a4107a70f57130daadb580-ol8_x86_64_appstream
bind9.16-license-9.16.23-0.22.el8_10.noarch.rpm707355a5b120c42ccb4039cd8414d78c-ol8_x86_64_appstream
bind9.16-utils-9.16.23-0.22.el8_10.x86_64.rpmda490aa9b1f255527965523be1ebaa03-ol8_x86_64_appstream
python3-bind9.16-9.16.23-0.22.el8_10.noarch.rpmb9dd8af6a840ef6ce7d392a7aef31a51-ol8_x86_64_appstream


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete