RLSA-2024:1782

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:1782.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:1782
Related
Published
2024-05-06T13:04:07.180395Z
Modified
2024-05-06T13:06:52.125550Z
Summary
Important: bind and dhcp security update
Details

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.

Security Fix(es):

  • bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)

  • bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)

  • bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / bind

Package

Name
bind
Purl
pkg:rpm/rocky-linux/bind?distro=rocky-linux-8&epoch=2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:9.11.36-11.el8_9.1

Rocky Linux:8 / dhcp

Package

Name
dhcp
Purl
pkg:rpm/rocky-linux/dhcp?distro=rocky-linux-8&epoch=2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:4.3.6-49.el8_9.1