SUSE-SU-2024:2868-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:2868-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2024:2868-1
Related
Published
2024-08-09T13:32:01Z
Modified
2024-08-09T13:32:01Z
Summary
Security update for bind
Details

This update for bind fixes the following issues:

Security issues fixed:

  • It is possible to craft excessively large numbers of resource record types for a given owner name, which has the effect of slowing down database processing. This has been addressed by only allowing a maximum of 100 records to be stored per name and type in a cache or zone database. (CVE-2024-1737, bsc#1228256)
  • Validating DNS messages signed using the SIG(0) protocol (RFC 2931) could cause excessive CPU load, leading to a denial-of-service condition. Support for SIG(0) message validation was removed from this version of named. (CVE-2024-1975, bsc#1228257)
References

Affected packages

SUSE:Linux Enterprise Software Development Kit 12 SP5 / bind

Package

Name
bind
Purl
purl:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.11.22-3.57.1

Ecosystem specific

{
    "binaries": [
        {
            "bind-devel": "9.11.22-3.57.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP5 / bind

Package

Name
bind
Purl
purl:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.11.22-3.57.1

Ecosystem specific

{
    "binaries": [
        {
            "bind-chrootenv": "9.11.22-3.57.1",
            "libbind9-161": "9.11.22-3.57.1",
            "bind-utils": "9.11.22-3.57.1",
            "python-bind": "9.11.22-3.57.1",
            "libisc1107-32bit": "9.11.22-3.57.1",
            "libisccc161": "9.11.22-3.57.1",
            "bind-doc": "9.11.22-3.57.1",
            "bind": "9.11.22-3.57.1",
            "libdns1110": "9.11.22-3.57.1",
            "libirs161": "9.11.22-3.57.1",
            "libisccfg163": "9.11.22-3.57.1",
            "liblwres161": "9.11.22-3.57.1",
            "libisc1107": "9.11.22-3.57.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP5 / bind

Package

Name
bind
Purl
purl:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.11.22-3.57.1

Ecosystem specific

{
    "binaries": [
        {
            "bind-chrootenv": "9.11.22-3.57.1",
            "libbind9-161": "9.11.22-3.57.1",
            "bind-utils": "9.11.22-3.57.1",
            "python-bind": "9.11.22-3.57.1",
            "libisc1107-32bit": "9.11.22-3.57.1",
            "libisccc161": "9.11.22-3.57.1",
            "bind-doc": "9.11.22-3.57.1",
            "bind": "9.11.22-3.57.1",
            "libdns1110": "9.11.22-3.57.1",
            "libirs161": "9.11.22-3.57.1",
            "libisccfg163": "9.11.22-3.57.1",
            "liblwres161": "9.11.22-3.57.1",
            "libisc1107": "9.11.22-3.57.1"
        }
    ]
}