Описание
Security update for bind
This update for bind fixes the following issues:
Update to release 9.18.33
Security Fixes:
- CVE-2024-11187: Fixes CPU exhaustion caused by many records in the additional section (bsc#1236596)
- CVE-2024-12705: Fixes multiple issues in DNS-over-HTTPS implementation when under heavy query load (bsc#1236597)
Список пакетов
Container suse/manager/5.0/x86_64/server:latest
Image SLES15-SP6
Image SLES15-SP6-BYOS
Image SLES15-SP6-BYOS-GCE
Image SLES15-SP6-CHOST-BYOS
Image SLES15-SP6-CHOST-BYOS-Azure
Image SLES15-SP6-CHOST-BYOS-EC2
Image SLES15-SP6-CHOST-BYOS-GCE
Image SLES15-SP6-CHOST-BYOS-GDC
Image SLES15-SP6-CHOST-BYOS-SAP-CCloud
Image SLES15-SP6-GCE
Image SLES15-SP6-Hardened-BYOS
Image SLES15-SP6-Hardened-BYOS-GCE
Image SLES15-SP6-SAP-BYOS
Image SLES15-SP6-SAP-BYOS-EC2
Image SLES15-SP6-SAP-BYOS-GCE
SUSE Linux Enterprise Module for Basesystem 15 SP6
SUSE Linux Enterprise Module for Server Applications 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2025:0355-1
- E-Mail link for SUSE-SU-2025:0355-1
- SUSE Security Ratings
- SUSE Bug 1236596
- SUSE Bug 1236597
- SUSE CVE CVE-2024-11187 page
- SUSE CVE CVE-2024-12705 page
Описание
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.
Затронутые продукты
Ссылки
- CVE-2024-11187
- SUSE Bug 1236596
Описание
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.
Затронутые продукты
Ссылки
- CVE-2024-12705
- SUSE Bug 1236597