ELSA-2022-6765

ELSA-2022-6765 - bind security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-10-03

Description


[32:9.11.4-26.P2.10]
- Fix memory leak in ECDSA verify processing (CVE-2022-38177)
- Fix memory leak in EdDSA verify processing (CVE-2022-38178)


Related CVEs


CVE-2022-38177
CVE-2022-38178

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) bind-9.11.4-26.P2.el7_9.10.src.rpm3fbdacad6313d3cdb648a2188054d102-
bind-9.11.4-26.P2.el7_9.10.aarch64.rpm117151e52eaf724012e61d22b406f0df-
bind-chroot-9.11.4-26.P2.el7_9.10.aarch64.rpm62373339fe20fa756072239b9276dfe3-
bind-devel-9.11.4-26.P2.el7_9.10.aarch64.rpmcc8351734038d0338ed46e14d3de7f8a-
bind-export-devel-9.11.4-26.P2.el7_9.10.aarch64.rpm451e559db49cef0a30d4af30bb4b63ab-
bind-export-libs-9.11.4-26.P2.el7_9.10.aarch64.rpm67f8419a1d8f55182b595e2e5aa415b0-
bind-libs-9.11.4-26.P2.el7_9.10.aarch64.rpma046e3c317ea210f4c279fc701f05232-
bind-libs-lite-9.11.4-26.P2.el7_9.10.aarch64.rpm30d5b004ead55cf9ac4b05fd7f05d906-
bind-license-9.11.4-26.P2.el7_9.10.noarch.rpmc96d8385a32acdbeb3bab9e21e040504-
bind-lite-devel-9.11.4-26.P2.el7_9.10.aarch64.rpm51ef8c466f92fa20cfcb1c92a2e3e878-
bind-pkcs11-9.11.4-26.P2.el7_9.10.aarch64.rpm35d72d72af99b96ab61b9dce31716cc1-
bind-pkcs11-devel-9.11.4-26.P2.el7_9.10.aarch64.rpm8079cbf40cd90421ec3daec88f1e32a7-
bind-pkcs11-libs-9.11.4-26.P2.el7_9.10.aarch64.rpm7695d2bf52585b6219f032fbbd16631d-
bind-pkcs11-utils-9.11.4-26.P2.el7_9.10.aarch64.rpm014623748a54c6c48f75566cff9a4ff6-
bind-sdb-9.11.4-26.P2.el7_9.10.aarch64.rpmfbdbc85b0236956103443dd095cc6cff-
bind-sdb-chroot-9.11.4-26.P2.el7_9.10.aarch64.rpmc235f40c87912f1720af4d7db61d2d56-
bind-utils-9.11.4-26.P2.el7_9.10.aarch64.rpm7a63e9a1366cef950bec318ee00c256e-
Oracle Linux 7 (x86_64) bind-9.11.4-26.P2.el7_9.10.src.rpm3fbdacad6313d3cdb648a2188054d102-
bind-9.11.4-26.P2.el7_9.10.x86_64.rpm712c82763ae0b141a4190ad6fa8379ac-
bind-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpmc5b81b61b918242e792e3b24047f33af-
bind-devel-9.11.4-26.P2.el7_9.10.i686.rpm9488c044c3daf87196195495d6094f74-
bind-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm5485fb12fa2c29a505b78cecec4b1b3b-
bind-export-devel-9.11.4-26.P2.el7_9.10.i686.rpm9373076e7018ff40ec8b90ff12e2eb68-
bind-export-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm8ae25953b8c1f0eea30d395e9d6c0bbf-
bind-export-libs-9.11.4-26.P2.el7_9.10.i686.rpma4138c85fee72192d70b8e1f2340d92a-
bind-export-libs-9.11.4-26.P2.el7_9.10.x86_64.rpme82ddfae548ee971b1edd081bbc6d81f-
bind-libs-9.11.4-26.P2.el7_9.10.i686.rpm0898dd12c253b596a62a9c7d6318257c-
bind-libs-9.11.4-26.P2.el7_9.10.x86_64.rpmd3f4a5873ae6b03940b074624d998b72-
bind-libs-lite-9.11.4-26.P2.el7_9.10.i686.rpmb0309d4e21e6742359c67fb6c66479db-
bind-libs-lite-9.11.4-26.P2.el7_9.10.x86_64.rpm115344a9a50af236b06d57442a32b28a-
bind-license-9.11.4-26.P2.el7_9.10.noarch.rpmc96d8385a32acdbeb3bab9e21e040504-
bind-lite-devel-9.11.4-26.P2.el7_9.10.i686.rpme4f58e78097fd573c0fabbd8e85c1414-
bind-lite-devel-9.11.4-26.P2.el7_9.10.x86_64.rpmc2034b6012bfde6355fee96a2027a339-
bind-pkcs11-9.11.4-26.P2.el7_9.10.x86_64.rpm938e2aeb20cf32d1254f381f049fa15c-
bind-pkcs11-devel-9.11.4-26.P2.el7_9.10.i686.rpm9cb52be9be358da9433b15bd768db076-
bind-pkcs11-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm0ef988093ad7b4e448f131fad6d5acc4-
bind-pkcs11-libs-9.11.4-26.P2.el7_9.10.i686.rpm559817acb7d38f9bd189ff92e6c59e22-
bind-pkcs11-libs-9.11.4-26.P2.el7_9.10.x86_64.rpmeb40d7aee81e562493c0e88b9e434d99-
bind-pkcs11-utils-9.11.4-26.P2.el7_9.10.x86_64.rpmea32c8bfb2811f4de433b653dc64adda-
bind-sdb-9.11.4-26.P2.el7_9.10.x86_64.rpmac63281824b3d3cffa9391e44f7d9c32-
bind-sdb-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpmc8d808cf4a8d17ecc3743b772875616a-
bind-utils-9.11.4-26.P2.el7_9.10.x86_64.rpm4bc26751c882346d247560eb9b4957d9-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete