Oracle Linux Security Advisory ELSA-2024-5390

http://linux.oracle.com/errata/ELSA-2024-5390.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
bind9.16-9.16.23-0.22.el8_10.x86_64.rpm
bind9.16-chroot-9.16.23-0.22.el8_10.x86_64.rpm
bind9.16-dnssec-utils-9.16.23-0.22.el8_10.x86_64.rpm
bind9.16-libs-9.16.23-0.22.el8_10.x86_64.rpm
bind9.16-license-9.16.23-0.22.el8_10.noarch.rpm
bind9.16-utils-9.16.23-0.22.el8_10.x86_64.rpm
python3-bind9.16-9.16.23-0.22.el8_10.noarch.rpm
bind9.16-devel-9.16.23-0.22.el8_10.i686.rpm
bind9.16-devel-9.16.23-0.22.el8_10.x86_64.rpm
bind9.16-doc-9.16.23-0.22.el8_10.noarch.rpm
bind9.16-libs-9.16.23-0.22.el8_10.i686.rpm

aarch64:
bind9.16-9.16.23-0.22.el8_10.aarch64.rpm
bind9.16-chroot-9.16.23-0.22.el8_10.aarch64.rpm
bind9.16-dnssec-utils-9.16.23-0.22.el8_10.aarch64.rpm
bind9.16-libs-9.16.23-0.22.el8_10.aarch64.rpm
bind9.16-license-9.16.23-0.22.el8_10.noarch.rpm
bind9.16-utils-9.16.23-0.22.el8_10.aarch64.rpm
python3-bind9.16-9.16.23-0.22.el8_10.noarch.rpm
bind9.16-devel-9.16.23-0.22.el8_10.aarch64.rpm
bind9.16-doc-9.16.23-0.22.el8_10.noarch.rpm


SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//bind9.16-9.16.23-0.22.el8_10.src.rpm

Related CVEs:

CVE-2024-1737
CVE-2024-1975
CVE-2024-4076




Description of changes:

[32:9.16.23-0.22]
- Minor fix of reclimit test backport (CVE-2024-1737)

[32:9.16.23-0.21]
- Backport addition of max-records-per-type and max-records-per-type options
  (CVE-2024-1737)

[32:9.16.23-0.20]
- Resolve CVE-2024-1975
- Resolve CVE-2024-1737
- Resolve CVE-2024-4076
- Add ability to change runtime limits for max types and records per name

[32:9.16.23-0.19]
- Add few more explicit conflicts with bind subpackages (RHEL-2208)

[32:9.16.23-0.18]
- Prevent crashing at masterformat system test (CVE-2023-6516)

[32:9.16.23-0.17]
- Prevent increased CPU load on large DNS messages (CVE-2023-4408)
- Prevent assertion failure when nxdomain-redirect is used with
 RFC 1918 reverse zones (CVE-2023-5517)
- Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
- Specific recursive query patterns may lead to an out-of-memory
  condition (CVE-2023-6516)
- Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
  CVE-2023-50868)
- Import tests for large DNS messages fix
- Add downstream change complementing CVE-2023-50387


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle8: ELSA-2024-5390: bind9.16 security Important Security Advisory Updates

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

Summary

[32:9.16.23-0.22] - Minor fix of reclimit test backport (CVE-2024-1737) [32:9.16.23-0.21] - Backport addition of max-records-per-type and max-records-per-type options (CVE-2024-1737) [32:9.16.23-0.20] - Resolve CVE-2024-1975 - Resolve CVE-2024-1737 - Resolve CVE-2024-4076 - Add ability to change runtime limits for max types and records per name [32:9.16.23-0.19] - Add few more explicit conflicts with bind subpackages (RHEL-2208) [32:9.16.23-0.18] - Prevent crashing at masterformat system test (CVE-2023-6516) [32:9.16.23-0.17] - Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868) - Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387

SRPMs

http://oss.oracle.com/ol8/SRPMS-updates//bind9.16-9.16.23-0.22.el8_10.src.rpm

x86_64

bind9.16-9.16.23-0.22.el8_10.x86_64.rpm bind9.16-chroot-9.16.23-0.22.el8_10.x86_64.rpm bind9.16-dnssec-utils-9.16.23-0.22.el8_10.x86_64.rpm bind9.16-libs-9.16.23-0.22.el8_10.x86_64.rpm bind9.16-license-9.16.23-0.22.el8_10.noarch.rpm bind9.16-utils-9.16.23-0.22.el8_10.x86_64.rpm python3-bind9.16-9.16.23-0.22.el8_10.noarch.rpm bind9.16-devel-9.16.23-0.22.el8_10.i686.rpm bind9.16-devel-9.16.23-0.22.el8_10.x86_64.rpm bind9.16-doc-9.16.23-0.22.el8_10.noarch.rpm bind9.16-libs-9.16.23-0.22.el8_10.i686.rpm

aarch64

bind9.16-9.16.23-0.22.el8_10.aarch64.rpm bind9.16-chroot-9.16.23-0.22.el8_10.aarch64.rpm bind9.16-dnssec-utils-9.16.23-0.22.el8_10.aarch64.rpm bind9.16-libs-9.16.23-0.22.el8_10.aarch64.rpm bind9.16-license-9.16.23-0.22.el8_10.noarch.rpm bind9.16-utils-9.16.23-0.22.el8_10.aarch64.rpm python3-bind9.16-9.16.23-0.22.el8_10.noarch.rpm bind9.16-devel-9.16.23-0.22.el8_10.aarch64.rpm bind9.16-doc-9.16.23-0.22.el8_10.noarch.rpm

i386

Severity
Related CVEs: CVE-2024-1737 CVE-2024-1975 CVE-2024-4076

Related News