Download
| Alert*
oval:org.secpod.oval:def:507742
The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: processing large delegations may severely degrade resolver perform ... oval:org.secpod.oval:def:2501055 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. oval:org.secpod.oval:def:1506765 [32:9.11.36-8] - Correct regression preventing bind-dyndb-ldap build [32:9.11.36-7] - Prevent excessive resource use while processing large delegations. [32:9.11.36-6] - Prevent freeing zone during statistics rendering oval:org.secpod.oval:def:88469 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:707727 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:2501090 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. oval:org.secpod.oval:def:507637 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: processing large delegations may severely degrade resolver perform ... oval:org.secpod.oval:def:507755 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: processing large delegations may severely degrade resolver perform ... oval:org.secpod.oval:def:2600196 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. oval:org.secpod.oval:def:1506689 [32:9.16.23-11] - Correct backport issue in statistics rendering fix [32:9.16.23-10] - Handle subtle difference between upstream and rhel [32:9.16.23-9] - Prevent flooding with UPDATE requests - Handle RRSIG queries when server-stale is active - Fix crash when soft-quota is reached and serve-sta ... oval:org.secpod.oval:def:1506739 [32:9.16.23-0.14] - Handle subtle difference between upstream and rhel [32:9.16.23-0.13] - Prevent flooding with UPDATE requests - Handle RRSIG queries when server-stale is active - Fix crash when soft-quota is reached and serve-stale is active [32:9.16.23-0.12] - Include bind9.16-dnssec-utils i ... oval:org.secpod.oval:def:2107899 Oracle Solaris 11 - ( CVE-2022-2881 ) oval:org.secpod.oval:def:610166 Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2022-2795 Yehuda Afek, Anat Bremler-Barr and Shani Stajnrod discovered that a flaw in the resolver code can cause named to spend excessive amounts of time on processing large delegations, significantly degrade resolver ... oval:org.secpod.oval:def:507506 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability * bind: processing ... oval:org.secpod.oval:def:124254 BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly. oval:org.secpod.oval:def:124253 This package provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server. oval:org.secpod.oval:def:89047045 This update for bind fixes the following issues: - CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations . - CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA a ... oval:org.secpod.oval:def:89047759 This update for bind fixes the following issues: - CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations . - CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA a ... oval:org.secpod.oval:def:84527 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:89047710 This update for bind fixes the following issues: - CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations . - CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA a ... oval:org.secpod.oval:def:88405 Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2022-2795 Yehuda Afek, Anat Bremler-Barr and Shani Stajnrod discovered that a flaw in the resolver code can cause named to spend excessive amounts of time on processing large delegations, significantly degrade resolver ... oval:org.secpod.oval:def:3300366 SUSE Security Update: Security update for bind oval:org.secpod.oval:def:88489 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:1506367 [32:9.11.4-26.P2.13] - Tighten cache protection against record from forwarders [32:9.11.4-26.P2.12] - Include test of forwarders [32:9.11.4-26.P2.11] - Prevent excessive resource use while processing large delegations oval:org.secpod.oval:def:89047784 This update for bind fixes the following issues: Update to release 9.16.33: - CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations . - CVE-2022-3080: Fixed assertion failure when there was a stale CNAME in the cache for the in ... oval:org.secpod.oval:def:1701241 A cache poisoning vulnerability was found in BIND when using forwarders. Bogus NS records supplied by the forwarders may be cached and used by name if it needs to recurse for any reason. This issue causes it to obtain and pass on potentially incorrect answers. This flaw allows a remote attacker to m ... oval:org.secpod.oval:def:124231 BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly. oval:org.secpod.oval:def:124230 This package provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server. oval:org.secpod.oval:def:89965 The remote host is missing a patch 119784-50 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:19500094 By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. A flaw was found in the Bind package, where the resolver can crash when stale cache and stal ... oval:org.secpod.oval:def:89961 The remote host is missing a patch 119783-50 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:206002 Security Fix: bind: DNS forwarders - cache poisoning vulnerability bind: processing large delegations may severely degrade resolver performance For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page liste ... oval:org.secpod.oval:def:3301031 SUSE Security Update: Security update for bind oval:org.secpod.oval:def:89047011 This update for bind fixes the following issues: - CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations . - CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA a ... oval:org.secpod.oval:def:97681 [CLSA-2022:1664476612] Fixed CVE-2022-2795 in bind oval:org.secpod.oval:def:90221 The remote host is missing a patch containing a security fix, which affects the following packages: bos.net.tcp.server, bos.net.tcp.bind_utils, bos.net.tcp.client and bos.net.tcp.bind. For more information please visit vendor advisory link. |