Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:3767-1

Опубликовано: 26 окт. 2022
Источник: suse-cvrf

Описание

Recommended update for bind

This update for bind fixes the following issues:

Update to release 9.16.33:

  • CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations (bsc#1203614).

  • CVE-2022-3080: Fixed assertion failure when there was a stale CNAME in the cache for the incoming query and the stale-answer-client-timeout option is set to 0 (bsc#1203618).

  • CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA algorithm (bsc#1203619).

  • CVE-2022-38178: Fixed memory leaks that could be externally triggered in the DNSSEC verification code for the EdDSA algorithm (bsc#1203620).

  • Add systemd drop-in directory for named service (bsc#1201689).

  • Add modified createNamedConfInclude script and README-bind.chrootenv (bsc#1203250).

  • Feature Changes:

    • Response Rate Limiting (RRL) code now treats all QNAMEs that are subject to wildcard processing within a given zone as the same name, to prevent circumventing the limits enforced by RRL.

    • Zones using dnssec-policy now require dynamic DNS or inline-signing to be configured explicitly.

    • A backward-compatible approach was implemented for encoding internationalized domain names (IDN) in dig and converting the domain to IDNA2008 form; if that fails, BIND tries an IDNA2003 conversion.

    • The DNSSEC algorithms RSASHA1 and NSEC3RSASHA1 are now automatically disabled on systems where they are disallowed by the security policy. Primary zones using those algorithms need to be migrated to new algorithms prior to running on these systems, as graceful migration to different DNSSEC algorithms is not possible when RSASHA1 is disallowed by the operating system.

    • Log messages related to fetch limiting have been improved to provide more complete information. Specifically, the final counts of allowed and spilled fetches are now logged before the counter object is destroyed.

    • Non-dynamic zones that inherit dnssec-policy from the view or options blocks were not marked as inline-signed and therefore never scheduled to be re-signed. This has been fixed.

    • The old max-zone-ttl zone option was meant to be superseded by the max-zone-ttl option in dnssec-policy; however, the latter option was not fully effective. This has been corrected: zones no longer load if they contain TTLs greater than the limit configured in dnssec-policy. For zones with both the old max-zone-ttl option and dnssec-policy configured, the old option is ignored, and a warning is generated.

    • rndc dumpdb -expired was fixed to include expired RRsets, even if stale-cache-enable is set to no and the cache-cleaning time window has passed. (jsc#SLE-24600)

Список пакетов

Image SLES15-SP4
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Basic
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Standard
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-BYOS-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-BYOS-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-BYOS-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-CHOST-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-CHOST-BYOS-Aliyun
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-CHOST-BYOS-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-CHOST-BYOS-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-CHOST-BYOS-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-CHOST-BYOS-SAP-CCloud
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-EC2-ECS-HVM
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-HPC
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-HPC-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-HPC-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-HPC-BYOS-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-HPC-BYOS-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-HPC-BYOS-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-HPC-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-HPC-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Hardened-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Hardened-BYOS-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Hardened-BYOS-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Hardened-BYOS-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Server-4-3
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Server-4-3-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Azure-LI-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-BYOS-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-BYOS-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-BYOS-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Hardened
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Hardened-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Hardened-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Hardened-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAP-Hardened-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAPCAL
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAPCAL-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAPCAL-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SAPCAL-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP5-EC2-ECS-HVM
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP5-HPC-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP5-HPC-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP5-SAP-Azure
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP5-SAP-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP5-SAP-GCE
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP5-SAP-Hardened-EC2
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
SUSE Linux Enterprise Module for Basesystem 15 SP4
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1
SUSE Linux Enterprise Module for Server Applications 15 SP4
bind-9.16.33-150400.5.11.1
bind-doc-9.16.33-150400.5.11.1
openSUSE Leap 15.4
bind-9.16.33-150400.5.11.1
bind-doc-9.16.33-150400.5.11.1
bind-utils-9.16.33-150400.5.11.1
python3-bind-9.16.33-150400.5.11.1

Описание

By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.


Затронутые продукты
Image SLES15-SP4-Azure-Basic:bind-utils-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Basic:python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Standard:bind-utils-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Standard:python3-bind-9.16.33-150400.5.11.1

Ссылки

Описание

By sending specific queries to the resolver, an attacker can cause named to crash.


Затронутые продукты
Image SLES15-SP4-Azure-Basic:bind-utils-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Basic:python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Standard:bind-utils-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Standard:python3-bind-9.16.33-150400.5.11.1

Ссылки

Описание

By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.


Затронутые продукты
Image SLES15-SP4-Azure-Basic:bind-utils-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Basic:python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Standard:bind-utils-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Standard:python3-bind-9.16.33-150400.5.11.1

Ссылки

Описание

By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.


Затронутые продукты
Image SLES15-SP4-Azure-Basic:bind-utils-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Basic:python3-bind-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Standard:bind-utils-9.16.33-150400.5.11.1
Image SLES15-SP4-Azure-Standard:python3-bind-9.16.33-150400.5.11.1

Ссылки
Уязвимость SUSE-SU-2022:3767-1