{"id":"MGASA-2023-0303","summary":"Updated bind packages fix security vulnerabilities","details":"The code that processes control channel messages sent to `named` calls\ncertain functions recursively during packet parsing. Recursion depth is\nonly limited by the maximum accepted packet size; depending on the\nenvironment, this may cause the packet-parsing code to run out of\navailable stack memory, causing `named` to terminate unexpectedly. Since\neach incoming control channel message is fully parsed before its\ncontents are authenticated, exploiting this flaw does not require the\nattacker to hold a valid RNDC key; only network access to the control\nchannel's configured TCP port is necessary. (CVE-2023-3341)\n\nA flaw in the networking code handling DNS-over-TLS queries may cause\n`named` to terminate unexpectedly due to an assertion failure. This\nhappens when internal data structures are incorrectly reused under\nsignificant DNS-over-TLS query load. (CVE-2023-4236)\n","modified":"2026-04-16T00:11:23.087190833Z","published":"2023-10-27T21:49:40Z","upstream":["CVE-2023-3341","CVE-2023-4236"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2023-0303.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=32039"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6390-1"}],"affected":[{"package":{"name":"bind","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/bind?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.18.15-2.2.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0303.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}