<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2022-0010</id>
    <title>An update for dhcp is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2022-10-08 17:46:40"/>
    <updated date="2022-10-08 17:46:40"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214" id="CVE-2021-25214" title="CVE-2021-25214 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215" id="CVE-2021-25215" title="CVE-2021-25215 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220" id="CVE-2021-25220" title="CVE-2021-25220 Base Score: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-25219" id="CVE-2021-25219" title="CVE-2021-25219 Base Score: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
    </references>
    <description>Security Fix(es):

In BIND 9.8.5 -&gt; 9.8.8, 9.9.3 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed. (CVE-2021-25214)

In BIND 9.0.0 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9. (CVE-2021-25215)

BIND 9.11.0 -&gt; 9.11.36 9.12.0 -&gt; 9.16.26 9.17.0 -&gt; 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -&gt; 9.11.36-S1 9.16.8-S1 -&gt; 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients. (CVE-2021-25220)

In BIND 9.3.0 -&gt; 9.11.35, 9.12.0 -&gt; 9.16.21, and versions 9.9.3-S1 -&gt; 9.11.35-S1 and 9.16.8-S1 -&gt; 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing. (CVE-2021-25219)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="dhcp">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="dhcp" version="4.4.2" release="13.r5.hce2">
          <filename>dhcp-4.4.2-13.r5.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="dhcp-devel" version="4.4.2" release="13.r5.hce2">
          <filename>dhcp-devel-4.4.2-13.r5.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="dhcp-help" version="4.4.2" release="13.r5.hce2">
          <filename>dhcp-help-4.4.2-13.r5.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="dhcp" version="4.4.2" release="13.r5.hce2">
          <filename>dhcp-4.4.2-13.r5.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="dhcp-devel" version="4.4.2" release="13.r5.hce2">
          <filename>dhcp-devel-4.4.2-13.r5.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
