Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:1670

Опубликовано: 17 мар. 2025
Источник: rocky
Оценка: Important

Описание

Important: bind9.18 security update

BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.

Security Fix(es):

  • bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187)

  • bind: bind9: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load (CVE-2024-12705)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
bind9.18x86_641.el9_5.1bind9.18-9.18.29-1.el9_5.1.x86_64.rpm
bind9.18-chrootx86_641.el9_5.1bind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpm
bind9.18-dnssec-utilsx86_641.el9_5.1bind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpm
bind9.18-libsx86_641.el9_5.1bind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm
bind9.18-utilsx86_641.el9_5.1bind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

suse-cvrf
9 месяцев назад

Security update for bind

oracle-oval
9 месяцев назад

ELSA-2025-1670: bind9.18 security update (IMPORTANT)

suse-cvrf
5 месяцев назад

Security update for bind

CVSS3: 7.5
ubuntu
9 месяцев назад

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
redhat
почти 2 года назад

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.