[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2024:2551 -- Redhat bind, python3-bind

ID: oval:org.secpod.oval:def:509265Date: (C)2024-06-14   (M)2024-06-13
Class: PATCHFamily: unix




The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources bind: KeyTrap - Extreme CPU consumption in DNSSEC validator bind: Specific recursive query patterns may lead to an out-of-memory condition bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind: Querying RFC 1918 reverse zones may cause an assertion failure when nxdomain-redirect is enabled bind: Parsing large DNS messages may cause excessive CPU load Bug Fix: bind-dyndb-ldap: rebuilt to adapt ABI changes in bind For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Platform:
Red Hat Enterprise Linux 9
Product:
bind
python3-bind
Reference:
RHSA-2024:2551
CVE-2023-50868
CVE-2023-50387
CVE-2023-6516
CVE-2023-5679
CVE-2023-5517
CVE-2023-4408
CVE    6
CVE-2023-5517
CVE-2023-4408
CVE-2023-6516
CVE-2023-5679
...
CPE    3
cpe:/a:isc:bind
cpe:/a:python:python3-bind
cpe:/o:redhat:enterprise_linux:9

© SecPod Technologies