7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
0.05 Low
EPSS
Percentile
92.9%
An update is available for dhcp, bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
Bug Fix:
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
rocky | 8 | aarch64 | bind | < 9.11.36-14.el8_10 | bind-32:9.11.36-14.el8_10.aarch64.rpm |
rocky | 8 | x86_64 | bind | < 9.11.36-14.el8_10 | bind-32:9.11.36-14.el8_10.x86_64.rpm |
rocky | 8 | aarch64 | bind-chroot | < 9.11.36-14.el8_10 | bind-chroot-32:9.11.36-14.el8_10.aarch64.rpm |
rocky | 8 | x86_64 | bind-chroot | < 9.11.36-14.el8_10 | bind-chroot-32:9.11.36-14.el8_10.x86_64.rpm |
rocky | 8 | aarch64 | bind-debuginfo | < 9.11.36-14.el8_10 | bind-debuginfo-32:9.11.36-14.el8_10.aarch64.rpm |
rocky | 8 | i686 | bind-debuginfo | < 9.11.36-14.el8_10 | bind-debuginfo-32:9.11.36-14.el8_10.i686.rpm |
rocky | 8 | x86_64 | bind-debuginfo | < 9.11.36-14.el8_10 | bind-debuginfo-32:9.11.36-14.el8_10.x86_64.rpm |
rocky | 8 | aarch64 | bind-debugsource | < 9.11.36-14.el8_10 | bind-debugsource-32:9.11.36-14.el8_10.aarch64.rpm |
rocky | 8 | i686 | bind-debugsource | < 9.11.36-14.el8_10 | bind-debugsource-32:9.11.36-14.el8_10.i686.rpm |
rocky | 8 | x86_64 | bind-debugsource | < 9.11.36-14.el8_10 | bind-debugsource-32:9.11.36-14.el8_10.x86_64.rpm |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
0.05 Low
EPSS
Percentile
92.9%