bind-9.16.23-1.el9.1
エラータID: AXSA:2022-4081:05
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly (CVE-2022-3080)
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2022-3080
By sending specific queries to the resolver, an attacker can cause named to crash.
CVE-2022-38177
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
CVE-2022-38178
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Update packages.
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
N/A
SRPMS
- bind-9.16.23-1.el9.1.src.rpm
MD5: 2d3f20f33985d2c8056eea80fbd2d44a
SHA-256: 18aa7929db29c6bc66849a5f9f957e8b765f6e4274b8fbcebd2dbd5c3f5d3311
Size: 4.94 MB
Asianux Server 9 for x86_64
- bind-9.16.23-1.el9.1.x86_64.rpm
MD5: f41dc2b3f4226768970aed85282715df
SHA-256: 3d83b993dde82aea7cf4266ea0df45af0ce4a30a2cf383a0cf771f6e928b22b2
Size: 488.95 kB - bind-chroot-9.16.23-1.el9.1.x86_64.rpm
MD5: a65374671324930a3cad2e46e6961f74
SHA-256: e39a66490d898a97a6b284f0fe5d63e09c24d9716499afb4d2d8e313d8f53fb5
Size: 16.96 kB - bind-devel-9.16.23-1.el9.1.x86_64.rpm
MD5: c130a524e7a203411914e22abb806759
SHA-256: 1c71f1745ff08623dca0ec391b325a8a05c22407ff033127068a1d32bd49baee
Size: 302.03 kB - bind-dnssec-doc-9.16.23-1.el9.1.noarch.rpm
MD5: e2599e961ba830373cc541e99a00a918
SHA-256: 359d7e12512126a184553b19b2e63ebe57906391e670a8bdee1e46c3eb2f1792
Size: 45.62 kB - bind-dnssec-utils-9.16.23-1.el9.1.x86_64.rpm
MD5: ed8aa0e959c04c06e30ddd2fc60835e8
SHA-256: cac9a54c8e157334c905f80ff44a3cc23d946069101a918612a469b2451d6b30
Size: 113.54 kB - bind-libs-9.16.23-1.el9.1.x86_64.rpm
MD5: 1b9050323c860f1b1f4daf31aa5f32b9
SHA-256: 4c79d708e4e7425d9ebafeb59c2fbd912641a4dd44a36d122c60932ea753fcab
Size: 1.24 MB - bind-license-9.16.23-1.el9.1.noarch.rpm
MD5: ba9cb06fefd78c8f7e907700824f236b
SHA-256: 5237bd6daec110d92c964567696a45d3562aec718ab69269b711d9629a261a4d
Size: 13.14 kB - bind-utils-9.16.23-1.el9.1.x86_64.rpm
MD5: f84d4b065a353a901a26554fc0cf7874
SHA-256: 67b55e0539bb5cccdf8adf22ed8739c0d1b89d60ff4867caacbf9fb689d39097
Size: 199.97 kB - python3-bind-9.16.23-1.el9.1.noarch.rpm
MD5: e18c69130986b1b42924211c19cfaf0a
SHA-256: 48fec3858eaf25d551a119002bad6973649c5be2254ce287e2078ff6035085e7
Size: 61.16 kB - bind-devel-9.16.23-1.el9.1.i686.rpm
MD5: e7caf291922659b13858ee7ef0a4af67
SHA-256: cc39712c736549c9c9d37b78baf76bc98f3896e6b4e12378f6474ed30bc1af0c
Size: 302.19 kB - bind-libs-9.16.23-1.el9.1.i686.rpm
MD5: 4dc6694c99aeac5e2dfb5cd8f1bc9c1a
SHA-256: f019d20bdd45e2f30cd56b9b402f92938c3758faf11072054bbdddbc5bcaa380
Size: 1.33 MB