QID 242103

Date Published: 2023-10-09

QID 242103: Red Hat Update for bind9.16 (RHSA-2023:5460)

The berkeley internet name domain (bind) is an implementation of the domain name system (dns) protocols.
Bind includes a dns server (named); a resolver library (routines for applications to use when interfacing with dns); and tools for verifying that the dns server is operating correctly...Security Fix(es):

    bind: stack exhaustion in control channel code may lead to dos (cve-2023-3341).
Affected Products:
    Red Hat enterprise linux for x86_64 8 x86_64.
    Red hat enterprise linux for x86_64 - extended update support 8.8 x86_64.
    Red hat enterprise linux for ibm z systems 8 s390x.
    Red hat enterprise linux for ibm z systems - extended update support 8.8 s390x.
    Red hat enterprise linux for power, little endian 8 ppc64le.
    Red hat enterprise linux for power, little endian - extended update support 8.8 ppc64le.
    Red hat enterprise linux server - tus 8.8 x86_64.
    Red hat enterprise linux for arm 64 8 aarch64.
    Red hat enterprise linux for x86_64 - update services for sap solutions 8.8 x86_64.
    Red hat codeready linux builder for x86_64 8 x86_64.
    Red hat codeready linux builder for arm 64 8 aarch64.
    Red hat codeready linux builder for ibm z systems 8 s390x.
    Red hat enterprise linux for arm 64 - extended update support 8.8 aarch64.
    Red hat enterprise linux server for power le - update services for sap solutions 8.8 ppc64le.
    Red hat codeready linux builder for power, little endian 8 ppc64le.
    Red hat codeready linux builder for x86_64 - extended update support 8.8 x86_64.
    Red hat codeready linux builder for power, little endian - extended update support 8.8 ppc64le.
    Red hat codeready linux builder for ibm z systems - extended update support 8.8 s390x.
    Red hat codeready linux builder for arm 64 - extended update support 8.8 aarch64.
.

Note: The preceding description block is extracted directly from the security advisory.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Refer to Red Hat security advisory RHSA-2023:5460 for updates and patch information.
    Vendor References

    CVEs related to QID 242103

    Software Advisories
    Advisory ID Software Component Link
    RHSA-2023:5460 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2023:5460