An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
bind-chroot-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-32:9.16.23-11.el9_2.2.src.rpm
bind-debuginfo-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-debugsource-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-devel-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-dnssec-doc-32:9.16.23-11.el9_2.2.noarch.rpm
bind-dnssec-utils-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-dnssec-utils-debuginfo-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-doc-32:9.16.23-11.el9_2.2.noarch.rpm
bind-libs-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-libs-debuginfo-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-license-32:9.16.23-11.el9_2.2.noarch.rpm
bind-utils-32:9.16.23-11.el9_2.2.aarch64.rpm
bind-utils-debuginfo-32:9.16.23-11.el9_2.2.aarch64.rpm
python3-bind-32:9.16.23-11.el9_2.2.noarch.rpm
No References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341
https://bugzilla.redhat.com/show_bug.cgi?id=2239621