[ALSA-2022:6763] Important: bind security update
Type:
security
Severity:
important
Release date:
2022-10-14
Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly (CVE-2022-3080) * bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177) * bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 bind-9.16.23-1.el9_0.1.aarch64.rpm 25d70498e092131a8f705dfe7ad896cd055cfc32b7a934834f95bbd1e83c6592
aarch64 bind-utils-9.16.23-1.el9_0.1.aarch64.rpm 2c5e1df34935671b9f4475e243a1ccaf6605df536f6e68597aa87285f25cc7ec
aarch64 bind-devel-9.16.23-1.el9_0.1.aarch64.rpm 554042dbd95f1e0249beeed93709b4c8943e52532a8a74a66d694d81e2b04b46
aarch64 bind-dnssec-utils-9.16.23-1.el9_0.1.aarch64.rpm 66099f013353d1b0034a76690b33c811a953dec5415af8d7f817d7b63f8ac003
aarch64 bind-chroot-9.16.23-1.el9_0.1.aarch64.rpm 69d1debaa897566c1be8d1c2419f4eceef9c72acb9bfb205b2ad1a0164cf4e20
aarch64 bind-libs-9.16.23-1.el9_0.1.aarch64.rpm 7e2236120c46441c5e970ed4fdaf46fffa1775c1c9bcdc1653930a9c49079769
i686 bind-devel-9.16.23-1.el9_0.1.i686.rpm a1f06c2cbe74517778b3c76672ea3aa6ba0ede096e2ae8f6c5a70af02cec9c86
i686 bind-libs-9.16.23-1.el9_0.1.i686.rpm fd311081e08d5d37bc66f868ac9b2e3971ad1eeffe619dc67c2c73f00d6799e7
noarch bind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpm 4088d5438d88486bafd546b5fb2ce066ca0050519d9080299ef4cdd16fb3b279
noarch python3-bind-9.16.23-1.el9_0.1.noarch.rpm b4ab83c8dc85311851f565c3d71ab2af15778c57f1b1216c43ca4c896fcf2d0a
noarch bind-license-9.16.23-1.el9_0.1.noarch.rpm e745141e636123b205e4d059aa3b57e080a29f58d014d6f6e5ca704d05093e33
ppc64le bind-dnssec-utils-9.16.23-1.el9_0.1.ppc64le.rpm 5e7727cc63a6205754bc7133e55fbe7488d58f48446fb7d7676ef94bdd10818e
ppc64le bind-utils-9.16.23-1.el9_0.1.ppc64le.rpm 5f08af577b3f0f852eb7df944aa11dd734f21e20283d445909b1fef7de4b8816
ppc64le bind-libs-9.16.23-1.el9_0.1.ppc64le.rpm 6475376bad1fda5fe4e614abe9ff8fba705f44dbc03699377211293abf0b8dc6
ppc64le bind-9.16.23-1.el9_0.1.ppc64le.rpm 7eccea68c9b95d62d1ad3ed66876ec998614f088b1f83beade1500c2476eeecb
ppc64le bind-devel-9.16.23-1.el9_0.1.ppc64le.rpm 86a3a1d351735b85d409e8b79eb90355c8a0a89a60d7306158d1015e6ec449ec
ppc64le bind-chroot-9.16.23-1.el9_0.1.ppc64le.rpm cb504a7cadcc528781bb90bf0538be53c771be14098f56567d2969b3c395932f
s390x bind-devel-9.16.23-1.el9_0.1.s390x.rpm 0f855846bdcc1b144a2d5ad60b1ca4f8c6c90212992f7db93bd7df2af72dae7c
s390x bind-libs-9.16.23-1.el9_0.1.s390x.rpm 3285b8b4aacf9d59c671a6b7df3b6165e99b4c1d1f0d5363c0b7742c1d137e88
s390x bind-dnssec-utils-9.16.23-1.el9_0.1.s390x.rpm 64265e8fd90a25e7efd9c1aa1ba8da91ca6d1a88438b59f54262788c5f93e233
s390x bind-chroot-9.16.23-1.el9_0.1.s390x.rpm a10c4c4b446ae5406c96497db5552c5f5e9f8229455cf8f20f07bf1bdd128b9b
s390x bind-utils-9.16.23-1.el9_0.1.s390x.rpm c11e187fde1f20cd234729b6ef065a6c3b6c42e2ea3cf472e7511d249e605784
s390x bind-9.16.23-1.el9_0.1.s390x.rpm f3270d758e96dbb1ed374fa45c8388174c60bce65ac0b7517be38a1a5c42cc76
x86_64 bind-utils-9.16.23-1.el9_0.1.x86_64.rpm 308098b4314dfa76bb257f01ca30b561b2502a0d257c0ce475bb4e0ab7e84c49
x86_64 bind-chroot-9.16.23-1.el9_0.1.x86_64.rpm 877fe5d04389d13997ffab9fdf88a1223f21ffa4cdb27fba87327ea0d164ad1b
x86_64 bind-libs-9.16.23-1.el9_0.1.x86_64.rpm 9412f0058481e9e3ba312e9715e27409bcfa67ba675e9bd8cd18edd4867dbb5e
x86_64 bind-9.16.23-1.el9_0.1.x86_64.rpm acd11f6909b9620744a6bf7d022570fe87b6231cf7634e1b0de654d2cac4632b
x86_64 bind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm cd48bf05c979cfd84e9d03c340ee46f547e987ad5593a86b61d05eba2c150a59
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.