<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0074</id>
    <title>An update for bind is now available for HCE 1.1</title>
    <severity>Important</severity>
    <release>HCE 1.1</release>
    <issued date="2023-04-13 03:08:49"/>
    <updated date="2023-04-13 03:08:49"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795" id="CVE-2022-2795" title="CVE-2022-2795 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177" id="CVE-2022-38177" title="CVE-2022-38177 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220" id="CVE-2021-25220" title="CVE-2021-25220 Base Score: 6.8 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178" id="CVE-2022-38178" title="CVE-2022-38178 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. (CVE-2022-2795)

By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. (CVE-2022-38177)

BIND 9.11.0 -&gt; 9.11.36 9.12.0 -&gt; 9.16.26 9.17.0 -&gt; 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -&gt; 9.11.36-S1 9.16.8-S1 -&gt; 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients. (CVE-2021-25220)

By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. (CVE-2022-38178)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="bind">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="bind" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-9.11.4-26.P2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-chroot" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-chroot-9.11.4-26.P2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-export-libs" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-export-libs-9.11.4-26.P2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-libs" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-libs-9.11.4-26.P2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-libs-lite" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-libs-lite-9.11.4-26.P2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="bind-license" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-license-9.11.4-26.P2.hce1c.14.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-pkcs11" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-pkcs11-9.11.4-26.P2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-pkcs11-libs" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-pkcs11-utils" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-utils" version="9.11.4" release="26.P2.hce1c.14">
          <filename>bind-utils-9.11.4-26.P2.hce1c.14.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
