[Debian] High CVE: CVE-2023-2828/CVE-2023-2911: bind: multiple CVEs

Bug #2025013 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
Peng Zhang

Bug Description

CVE-2023-2828: https://nvd.nist.gov/vuln/detail/CVE-2023-2828

Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.

CVE-2023-2911: https://nvd.nist.gov/vuln/detail/CVE-2023-2911

If the `recursive-clients` quota is reached on a BIND 9 resolver configured with both `stale-answer-enable yes;` and `stale-answer-client-timeout 0;`, a sequence of serve-stale-related lookups could cause `named` to loop and terminate unexpectedly due to a stack overflow. This issue affects BIND 9 versions 9.16.33 through 9.16.41, 9.18.7 through 9.18.15, 9.16.33-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.

Base Score: High

https://www.debian.org/security/2023/dsa-5439

['bind9-dnsutils_1:9.16.37-1~deb11u1_amd64.deb===>bind9-dnsutils_1:9.16.42-1~deb11u1_amd64.deb', 'bind9-host_1:9.16.37-1~deb11u1_amd64.deb===>bind9-host_1:9.16.42-1~deb11u1_amd64.deb', 'bind9-libs_1:9.16.37-1~deb11u1_amd64.deb===>bind9-libs_1:9.16.42-1~deb11u1_amd64.deb']

CVE References

Yue Tao (wrytao)
tags: added: stx.9.0 stx.security
Peng Zhang (pzhang2)
Changed in starlingx:
assignee: nobody → Peng Zhang (pzhang2)
status: Triaged → In Progress
Revision history for this message
Ghada Khalil (gkhalil) wrote :
Changed in starlingx:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.