SUSE Security Update: Security update for bind ______________________________________________________________________________ Announcement ID: SUSE-SU-2023:0341-1 Rating: important References: #1207471 #1207473 #1207475 SLE-24600 Cross-References: CVE-2022-3094 CVE-2022-3736 CVE-2022-3924 CVSS scores: CVE-2022-3094 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2022-3094 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2022-3736 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2022-3736 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2022-3924 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2022-3924 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Module for Server Applications 15-SP4 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.3 SUSE Manager Retail Branch Server 4.3 SUSE Manager Server 4.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that fixes three vulnerabilities, contains one feature is now available. Description: This update for bind fixes the following issues: - Updated to version 9.16.37 (jsc#SLE-24600): - CVE-2022-3094: Fixed an issue where a message flood could exhaust all available memory (bsc#1207471). - CVE-2022-3736: Fixed a potential crash upon receiving an RRSIG in configurations with stale cache and stale answers enabled and stale-answer-client-timeout set to a positive value (bsc#1207473). - CVE-2022-3924: Fixed a potential crash upon reaching the recursive-clients soft quota in configurations with stale answers enabled and stale-answer-client-timeout set to a positive value (bsc#1207475). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2023-341=1 - SUSE Linux Enterprise Module for Server Applications 15-SP4: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-341=1 - SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-341=1 Package List: - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): bind-9.16.37-150400.5.17.1 bind-debuginfo-9.16.37-150400.5.17.1 bind-debugsource-9.16.37-150400.5.17.1 bind-utils-9.16.37-150400.5.17.1 bind-utils-debuginfo-9.16.37-150400.5.17.1 - openSUSE Leap 15.4 (noarch): bind-doc-9.16.37-150400.5.17.1 python3-bind-9.16.37-150400.5.17.1 - SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64): bind-9.16.37-150400.5.17.1 bind-debuginfo-9.16.37-150400.5.17.1 bind-debugsource-9.16.37-150400.5.17.1 - SUSE Linux Enterprise Module for Server Applications 15-SP4 (noarch): bind-doc-9.16.37-150400.5.17.1 - SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64): bind-debuginfo-9.16.37-150400.5.17.1 bind-debugsource-9.16.37-150400.5.17.1 bind-utils-9.16.37-150400.5.17.1 bind-utils-debuginfo-9.16.37-150400.5.17.1 - SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch): python3-bind-9.16.37-150400.5.17.1 References: https://www.suse.com/security/cve/CVE-2022-3094.html https://www.suse.com/security/cve/CVE-2022-3736.html https://www.suse.com/security/cve/CVE-2022-3924.html https://bugzilla.suse.com/1207471 https://bugzilla.suse.com/1207473 https://bugzilla.suse.com/1207475