ALAS2023-2023-240 --- bindID: oval:org.secpod.oval:def:19500282 | Date: (C)2024-01-04 (M)2024-04-25 |
Class: PATCH | Family: unix |
A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly. If the 'recursive-clients' quota is reached on a BIND 9 resolver configured with both 'stale-answer-enable yes;' and 'stale-answer-client-timeout 0;', a sequence of serve-stale-related lookups could cause 'named' to loop and terminate unexpectedly due to a stack overflow.This issue affects BIND 9 versions 9.16.33 through 9.16.41, 9.18.7 through 9.18.15, 9.16.33-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1
Platform: |
Amazon Linux 2023 |