[Debian] High CVE: CVE-2023-3341/CVE-2023-4236 bind9: multiple CVEs

Bug #2037162 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
Li Zhou

Bug Description

CVE-2023-3341: https://nvd.nist.gov/vuln/detail/CVE-2023-3341

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

CVE-2023-4236: https://nvd.nist.gov/vuln/detail/CVE-2023-4236

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load.
This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

Base Score: High

Reference:

['bind9-dnsutils_1:9.16.42-1~deb11u1_amd64.deb===>bind9-dnsutils_1:9.16.44-1~deb11u1_amd64.deb', 'bind9-host_1:9.16.42-1~deb11u1_amd64.deb===>bind9-host_1:9.16.44-1~deb11u1_amd64.deb', 'bind9-libs_1:9.16.42-1~deb11u1_amd64.deb===>bind9-libs_1:9.16.44-1~deb11u1_amd64.deb']
https://www.debian.org/security/2023/dsa-5504

CVE References

Li Zhou (lzhou2)
Changed in starlingx:
assignee: nobody → Li Zhou (lzhou2)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tools (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/tools/+/898059

Changed in starlingx:
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tools (master)

Reviewed: https://review.opendev.org/c/starlingx/tools/+/898059
Committed: https://opendev.org/starlingx/tools/commit/f268f0fbe66afae046661604ce0e17e4adf2a774
Submitter: "Zuul (22348)"
Branch: master

commit f268f0fbe66afae046661604ce0e17e4adf2a774
Author: Li Zhou <email address hidden>
Date: Fri Oct 6 22:46:46 2023 -0700

    Debian: bind9: fix CVE-2023-3341/CVE-2023-4236

    Upgrade bind9 related packages' version from 1:9.16.42-1~deb11u1
    to 1:9.16.44-1~deb11u1 to fix CVE-2023-3341/CVE-2023-4236.

    Test Plan:
     Pass: downloader
     Pass: build-pkgs --clean --all
     Pass: build-image
     Pass: boot

    Closes-bug: #2037162

    Signed-off-by: Li Zhou <email address hidden>
    Change-Id: I9880950e3d197fb6fe73804cd92c38491fb50dee

Changed in starlingx:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.