Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:4108-1

Опубликовано: 14 нояб. 2025
Источник: suse-cvrf

Описание

Security update for bind

This update for bind fixes the following issues:

  • CVE-2025-40778: Address various spoofing attacks (bsc#1252379).
  • CVE-2025-40780: Cache-poisoning due to weak pseudo-random number generator (bsc#1252380).

Список пакетов

SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
bind-9.16.50-150500.8.32.1
bind-doc-9.16.50-150500.8.32.1
bind-utils-9.16.50-150500.8.32.1
python3-bind-9.16.50-150500.8.32.1
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
bind-9.16.50-150500.8.32.1
bind-doc-9.16.50-150500.8.32.1
bind-utils-9.16.50-150500.8.32.1
python3-bind-9.16.50-150500.8.32.1
SUSE Linux Enterprise Micro 5.5
bind-utils-9.16.50-150500.8.32.1
python3-bind-9.16.50-150500.8.32.1
SUSE Linux Enterprise Server 15 SP5-LTSS
bind-9.16.50-150500.8.32.1
bind-doc-9.16.50-150500.8.32.1
bind-utils-9.16.50-150500.8.32.1
python3-bind-9.16.50-150500.8.32.1
SUSE Linux Enterprise Server for SAP Applications 15 SP5
bind-9.16.50-150500.8.32.1
bind-doc-9.16.50-150500.8.32.1
bind-utils-9.16.50-150500.8.32.1
python3-bind-9.16.50-150500.8.32.1

Описание

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:bind-9.16.50-150500.8.32.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:bind-doc-9.16.50-150500.8.32.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:bind-utils-9.16.50-150500.8.32.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:python3-bind-9.16.50-150500.8.32.1

Ссылки

Описание

In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:bind-9.16.50-150500.8.32.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:bind-doc-9.16.50-150500.8.32.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:bind-utils-9.16.50-150500.8.32.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:python3-bind-9.16.50-150500.8.32.1

Ссылки