Lucene search

K
amazonAmazonALAS2-2023-2112
HistoryJul 05, 2023 - 10:01 p.m.

Important: bind

2023-07-0522:01:00
alas.aws.amazon.com
13
bind
amazon linux 2
vulnerability
max-cache-size
yum update
security advisory

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.8%

Issue Overview:

A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly. (CVE-2023-2828)

Affected Packages:

bind

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update bind to update your system.

New Packages:

aarch64:  
    bind-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-pkcs11-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-pkcs11-utils-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-pkcs11-libs-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-pkcs11-devel-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-sdb-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-libs-lite-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-libs-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-utils-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-devel-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-lite-devel-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-chroot-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-sdb-chroot-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-export-libs-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-export-devel-9.11.4-26.P2.amzn2.13.1.aarch64  
    bind-debuginfo-9.11.4-26.P2.amzn2.13.1.aarch64  
  
i686:  
    bind-9.11.4-26.P2.amzn2.13.1.i686  
    bind-pkcs11-9.11.4-26.P2.amzn2.13.1.i686  
    bind-pkcs11-utils-9.11.4-26.P2.amzn2.13.1.i686  
    bind-pkcs11-libs-9.11.4-26.P2.amzn2.13.1.i686  
    bind-pkcs11-devel-9.11.4-26.P2.amzn2.13.1.i686  
    bind-sdb-9.11.4-26.P2.amzn2.13.1.i686  
    bind-libs-lite-9.11.4-26.P2.amzn2.13.1.i686  
    bind-libs-9.11.4-26.P2.amzn2.13.1.i686  
    bind-utils-9.11.4-26.P2.amzn2.13.1.i686  
    bind-devel-9.11.4-26.P2.amzn2.13.1.i686  
    bind-lite-devel-9.11.4-26.P2.amzn2.13.1.i686  
    bind-chroot-9.11.4-26.P2.amzn2.13.1.i686  
    bind-sdb-chroot-9.11.4-26.P2.amzn2.13.1.i686  
    bind-export-libs-9.11.4-26.P2.amzn2.13.1.i686  
    bind-export-devel-9.11.4-26.P2.amzn2.13.1.i686  
    bind-debuginfo-9.11.4-26.P2.amzn2.13.1.i686  
  
noarch:  
    bind-license-9.11.4-26.P2.amzn2.13.1.noarch  
  
src:  
    bind-9.11.4-26.P2.amzn2.13.1.src  
  
x86_64:  
    bind-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-pkcs11-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-pkcs11-utils-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-pkcs11-libs-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-pkcs11-devel-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-sdb-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-libs-lite-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-libs-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-utils-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-devel-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-lite-devel-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-chroot-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-sdb-chroot-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-export-libs-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-export-devel-9.11.4-26.P2.amzn2.13.1.x86_64  
    bind-debuginfo-9.11.4-26.P2.amzn2.13.1.x86_64  

Additional References

Red Hat: CVE-2023-2828

Mitre: CVE-2023-2828

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.8%