RHSA-2024:2551 -- Redhat bind, python3-bindID: oval:org.secpod.oval:def:509265 | Date: (C)2024-06-14 (M)2024-06-13 |
Class: PATCH | Family: unix |
The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources bind: KeyTrap - Extreme CPU consumption in DNSSEC validator bind: Specific recursive query patterns may lead to an out-of-memory condition bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind: Querying RFC 1918 reverse zones may cause an assertion failure when nxdomain-redirect is enabled bind: Parsing large DNS messages may cause excessive CPU load Bug Fix: bind-dyndb-ldap: rebuilt to adapt ABI changes in bind For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
Platform: |
Red Hat Enterprise Linux 9 |