Lucene search

K
oraclelinuxOracleLinuxELSA-2024-5390
HistoryAug 14, 2024 - 12:00 a.m.

bind9.16 security update

2024-08-1400:00:00
linux.oracle.com
5
bind9.16
security update
cve-2024-1975
cve-2024-1737
cve-2024-4076
runtime limits

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low

[32:9.16.23-0.22]

  • Minor fix of reclimit test backport (CVE-2024-1737)
    [32:9.16.23-0.21]
  • Backport addition of max-records-per-type and max-records-per-type options
    (CVE-2024-1737)
    [32:9.16.23-0.20]
  • Resolve CVE-2024-1975
  • Resolve CVE-2024-1737
  • Resolve CVE-2024-4076
  • Add ability to change runtime limits for max types and records per name
    [32:9.16.23-0.19]
  • Add few more explicit conflicts with bind subpackages (RHEL-2208)
    [32:9.16.23-0.18]
  • Prevent crashing at masterformat system test (CVE-2023-6516)
    [32:9.16.23-0.17]
  • Prevent increased CPU load on large DNS messages (CVE-2023-4408)
  • Prevent assertion failure when nxdomain-redirect is used with
    RFC 1918 reverse zones (CVE-2023-5517)
  • Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
  • Specific recursive query patterns may lead to an out-of-memory
    condition (CVE-2023-6516)
  • Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
    CVE-2023-50868)
  • Import tests for large DNS messages fix
  • Add downstream change complementing CVE-2023-50387

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low