<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2024-0044</id>
    <title>An update for bind is now available for HCE 1.1</title>
    <severity>Important</severity>
    <release>HCE 1.1</release>
    <issued date="2024-09-27 08:26:20"/>
    <updated date="2024-09-27 08:26:20"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868" id="CVE-2023-50868" title="CVE-2023-50868 Base Score: 3.5 Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408" id="CVE-2023-4408" title="CVE-2023-4408 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387" id="CVE-2023-50387" title="CVE-2023-50387 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the &quot;NSEC3&quot; issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations. (CVE-2023-50868)

The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers.
This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1. (CVE-2023-4408)

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the &quot;KeyTrap&quot; issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records. (CVE-2023-50387)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="bind">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="bind" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-9.11.4-26.P2.hce1c.16.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-chroot" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-chroot-9.11.4-26.P2.hce1c.16.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-export-libs" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-export-libs-9.11.4-26.P2.hce1c.16.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-libs" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-libs-9.11.4-26.P2.hce1c.16.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-libs-lite" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-libs-lite-9.11.4-26.P2.hce1c.16.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="bind-license" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-license-9.11.4-26.P2.hce1c.16.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-pkcs11" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-pkcs11-9.11.4-26.P2.hce1c.16.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-pkcs11-libs" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.hce1c.16.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-pkcs11-utils" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.hce1c.16.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="bind-utils" version="9.11.4" release="26.P2.hce1c.16">
          <filename>bind-utils-9.11.4-26.P2.hce1c.16.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
