|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-2828: bind: DOS against recursive resolvers related to cache-cleaning algorithm | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Robert Frohl <rfrohl> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | brahmajit.das, joyeta.modak, meissner |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/369966/ | ||
| See Also: | https://bugzilla.suse.com/show_bug.cgi?id=1213847 | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-2828:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSSv3.1:SUSE:CVE-2023-2911:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
SUSE-SU-2023:2667-1: An update that solves two vulnerabilities and contains one feature can now be installed. Category: security (important) Bug References: 1212544, 1212567 CVE References: CVE-2023-2828, CVE-2023-2911 Jira References: SLE-24600 Sources used: openSUSE Leap 15.4 (src): bind-9.16.42-150400.5.27.1 Basesystem Module 15-SP4 (src): bind-9.16.42-150400.5.27.1 Server Applications Module 15-SP4 (src): bind-9.16.42-150400.5.27.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE:SLE-10-SP3:Update:Test/bind isn't affected, as that version uses a whole different cache implementation. I have submitted patches for all affected codestreams and all were accepted. SUSE-SU-2023:2789-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1212544 CVE References: CVE-2023-2828 Sources used: SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): bind-9.9.9P1-63.40.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:2794-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1212544 CVE References: CVE-2023-2828 Sources used: SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): bind-9.16.6-150000.12.68.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): bind-9.16.6-150000.12.68.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): bind-9.16.6-150000.12.68.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): bind-9.16.6-150000.12.68.1 SUSE Enterprise Storage 7 (src): bind-9.16.6-150000.12.68.1 SUSE CaaS Platform 4.0 (src): bind-9.16.6-150000.12.68.1 openSUSE Leap 15.4 (src): bind-9.16.6-150000.12.68.1 SUSE Manager Client Tools for SLE Micro 5 (src): bind-9.16.6-150000.12.68.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): bind-9.16.6-150000.12.68.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): bind-9.16.6-150000.12.68.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:2793-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1212544 CVE References: CVE-2023-2828 Sources used: SUSE OpenStack Cloud 9 (src): bind-9.11.22-3.46.4 SUSE OpenStack Cloud Crowbar 9 (src): bind-9.11.22-3.46.4 SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): bind-9.11.22-3.46.4 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): bind-9.11.22-3.46.4 SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): bind-9.11.22-3.46.4 SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): bind-9.11.22-3.46.4 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): bind-9.11.22-3.46.4 SUSE Linux Enterprise Server 12 SP5 (src): bind-9.11.22-3.46.4 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): bind-9.11.22-3.46.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:2836-1: An update that solves two vulnerabilities, contains one feature and has one fix can now be installed. Category: security (important) Bug References: 1212090, 1212544, 1212567 CVE References: CVE-2023-2828, CVE-2023-2911 Jira References: SLE-24600 Sources used: openSUSE Leap 15.5 (src): bind-9.16.42-150500.8.3.1 Basesystem Module 15-SP5 (src): bind-9.16.42-150500.8.3.1 Server Applications Module 15-SP5 (src): bind-9.16.42-150500.8.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. I got a bug to provide fix on sles11-sp1 for CVE-2023-2828. I wanted confirmation , if sles11-sp1 is affected or not. (In reply to Joyeta Modak from comment #17) > I got a bug to provide fix on sles11-sp1 for CVE-2023-2828. > I wanted confirmation , if sles11-sp1 is affected or not. Similar situation here SLES 11 SP3. The information over at [1] says "ignore" beside 11 SP3. But I see a submission for 11 SP2 [2]. Also [1] says > This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1. and on 11 sp3 and 11 sp2, bind version is 9.9.6-P1. So when customer requests for PTF for this CVE can we use this patches [2] as a fix? [1]: https://www.suse.com/security/cve/CVE-2023-2828.html [2]: https://build.suse.de/request/show/302214 SUSE-SU-2023:2954-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1212544 CVE References: CVE-2023-2828 Sources used: openSUSE Leap 15.3 (src): bind-9.16.6-150300.22.30.1 openSUSE Leap 15.4 (src): bind-9.16.6-150300.22.30.1 Basesystem Module 15-SP4 (src): bind-9.16.6-150300.22.30.1 Basesystem Module 15-SP5 (src): bind-9.16.6-150300.22.30.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): bind-9.16.6-150300.22.30.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): bind-9.16.6-150300.22.30.1 SUSE Linux Enterprise Real Time 15 SP3 (src): bind-9.16.6-150300.22.30.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): bind-9.16.6-150300.22.30.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): bind-9.16.6-150300.22.30.1 SUSE Manager Proxy 4.2 (src): bind-9.16.6-150300.22.30.1 SUSE Manager Retail Branch Server 4.2 (src): bind-9.16.6-150300.22.30.1 SUSE Manager Server 4.2 (src): bind-9.16.6-150300.22.30.1 SUSE Enterprise Storage 7.1 (src): bind-9.16.6-150300.22.30.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. Done, closing. |
CVE-2023-2828: named's configured cache size limit can be significantly exceeded Versions affected: BIND 9.11.0 -> 9.16.41 9.18.0 -> 9.18.15 9.19.0 -> 9.19.13 BIND Supported Preview Edition 9.11.3-S1 -> 9.16.41-S1 9.18.11-S1 -> 9.18.15-S1 (Versions prior to 9.11.37 & 9.11.37-S1 were not assessed, but we believe that all versions of BIND 9.11 are vulnerable. Some even older major branches may be vulnerable as well.) Severity: High Exploitable: Remotely Description: Every named instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the max-cache-size statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to be significantly exceeded. Impact: By exploiting this flaw, an attacker can cause the amount of memory used by a named resolver to go well beyond the configured max-cache-size limit. The effectiveness of the attack depends on a number of factors (e.g. query load, query patterns), but since the default value of the max-cache-size statement is 90%, in the worst case the attacker can exhaust all available memory on the host running named, leading to a denial-of-service condition. CVSS Score: 7.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H For more information on the Common Vulnerability Scoring System and to obtain your specific environmental score please visit: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1. Workarounds: No workarounds known. Active exploits: We are not aware of any active exploits. Solution: Upgrade to the patched release most closely related to your current version of BIND 9: 9.16.42 9.18.16 9.19.14 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. 9.16.42-S1 9.18.16-S1 Acknowledgments: ISC would like to thank Shoham Danino from Reichman University, Anat Bremler-Barr from Tel-Aviv University, Yehuda Afek from Tel-Aviv University, and Yuval Shavitt from Tel-Aviv University for bringing this vulnerability to our attention. Document revision history: 1.0 Early Notification, 14 June 2023 2.0 Public disclosure, 21 June 2023 https://kb.isc.org/docs/cve-2023-2828