Source: bind9
Version: 1:9.20.4-4
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 1:9.18.28-1~deb12u2
Control: fixed -1 1:9.18.33-1~deb12u2

Hi,

The following vulnerabilities were published for bind9.

CVE-2024-11187[0]:
| It is possible to construct a zone such that some queries to it will
| generate responses containing numerous records in the Additional
| section. An attacker sending many such queries can cause either the
| authoritative server itself or an independent resolver to use
| disproportionate resources processing the queries. Zones will
| usually need to have been deliberately crafted to attack this
| exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37,
| 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through
| 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1,
| 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.


CVE-2024-12705[1]:
| Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU
| and/or memory by flooding it with crafted valid or invalid HTTP/2
| traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32,
| 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through
| 9.18.32-S1.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-11187
    https://www.cve.org/CVERecord?id=CVE-2024-11187
    https://kb.isc.org/docs/cve-2024-11187
[1] https://security-tracker.debian.org/tracker/CVE-2024-12705
    https://www.cve.org/CVERecord?id=CVE-2024-12705
    https://kb.isc.org/docs/cve-2024-12705

Regards,
Salvatore

Reply via email to