Red Hat Security Advisory: bind security update
Advisory ID:       SLSA-2023:5691
Issue Date:        2023-10-12
CVE Numbers:       CVE-2023-3341
--

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341)

---
This content is derived from https://access.redhat.com/errata/RHSA-2023:5691
--

SL7
  srpm
    bind-32:9.11.4-26.P2.el7_9.15.src
  i386
    bind-export-libs-32:9.11.4-26.P2.el7_9.15.i686
  x86_64
    bind-export-libs-32:9.11.4-26.P2.el7_9.15.x86_64
  noarch
    bind-license-32:9.11.4-26.P2.el7_9.15.noarch

- Scientific Linux Development Team

SciLinux: Important: bind on SL7 i386/srpm/x86_64

bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341) --- This content is derived from https://access.redhat.com/errata/RHSA-2023:5691 SL7 srpm bind-32:9.1...

Summary

Red Hat Security Advisory: bind security update



Security Fixes

* bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341)
This content is derived from https://access.redhat.com/errata/RHSA-2023:5691
SL7 srpm bind-32:9.11.4-26.P2.el7_9.15.src i386 bind-export-libs-32:9.11.4-26.P2.el7_9.15.i686 x86_64 bind-export-libs-32:9.11.4-26.P2.el7_9.15.x86_64 noarch bind-license-32:9.11.4-26.P2.el7_9.15.noarch
- Scientific Linux Development Team

Severity
Issued Date: : 2023-10-12
CVE Numbers: CVE-2023-3341
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Related News