Lucene search

K
oraclelinuxOracleLinuxELSA-2024-1781
HistoryApr 11, 2024 - 12:00 a.m.

bind9.16 security update

2024-04-1100:00:00
linux.oracle.com
17
bind9.16
security update
prevent crashing
increased cpu load
large dns messages
cve-2023-6516
cve-2023-4408
cve-2023-5517
cve-2023-5679
cve-2023-50387
cve-2023-50868
cve-2023-3341
cve-2023-2828

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.037 Low

EPSS

Percentile

91.7%

[32:9.16.23-0.16.2]

  • Prevent crashing at masterformat system test (CVE-2023-6516)
    [32:9.16.23-0.16.1]
  • Prevent increased CPU load on large DNS messages (CVE-2023-4408)
  • Prevent assertion failure when nxdomain-redirect is used with
    RFC 1918 reverse zones (CVE-2023-5517)
  • Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
  • Specific recursive query patterns may lead to an out-of-memory
    condition (CVE-2023-6516)
  • Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
    CVE-2023-50868)
  • Import tests for large DNS messages fix
  • Add downstream change complementing CVE-2023-50387
    [32:9.16.23-0.16]
  • Limit the amount of recursion possible in control channel (CVE-2023-3341)
    [32:9.16.23-0.15]
  • Strengten cache cleaning to prevent overflowing configured limit
    (CVE-2023-2828)

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.037 Low

EPSS

Percentile

91.7%