<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">bind-9.18.7-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12356-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">bind-9.18.7-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the bind-9.18.7-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12356</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2795/</URL>
      <Description>SUSE CVE CVE-2022-2795 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2881/</URL>
      <Description>SUSE CVE CVE-2022-2881 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2906/</URL>
      <Description>SUSE CVE CVE-2022-2906 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3080/</URL>
      <Description>SUSE CVE CVE-2022-3080 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-38178/</URL>
      <Description>SUSE CVE CVE-2022-38178 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="bind-9.18.7-1.1">
      <FullProductName ProductID="bind-9.18.7-1.1">bind-9.18.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-doc-9.18.7-1.1">
      <FullProductName ProductID="bind-doc-9.18.7-1.1">bind-doc-9.18.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-bdbhpt-9.18.7-1.1">
      <FullProductName ProductID="bind-modules-bdbhpt-9.18.7-1.1">bind-modules-bdbhpt-9.18.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-generic-9.18.7-1.1">
      <FullProductName ProductID="bind-modules-generic-9.18.7-1.1">bind-modules-generic-9.18.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-ldap-9.18.7-1.1">
      <FullProductName ProductID="bind-modules-ldap-9.18.7-1.1">bind-modules-ldap-9.18.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-mysql-9.18.7-1.1">
      <FullProductName ProductID="bind-modules-mysql-9.18.7-1.1">bind-modules-mysql-9.18.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-perl-9.18.7-1.1">
      <FullProductName ProductID="bind-modules-perl-9.18.7-1.1">bind-modules-perl-9.18.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-sqlite3-9.18.7-1.1">
      <FullProductName ProductID="bind-modules-sqlite3-9.18.7-1.1">bind-modules-sqlite3-9.18.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-utils-9.18.7-1.1">
      <FullProductName ProductID="bind-utils-9.18.7-1.1">bind-utils-9.18.7-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="bind-9.18.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-9.18.7-1.1">bind-9.18.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-doc-9.18.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-doc-9.18.7-1.1">bind-doc-9.18.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-bdbhpt-9.18.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-bdbhpt-9.18.7-1.1">bind-modules-bdbhpt-9.18.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-generic-9.18.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-generic-9.18.7-1.1">bind-modules-generic-9.18.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-ldap-9.18.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-ldap-9.18.7-1.1">bind-modules-ldap-9.18.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-mysql-9.18.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-mysql-9.18.7-1.1">bind-modules-mysql-9.18.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-perl-9.18.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-perl-9.18.7-1.1">bind-modules-perl-9.18.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-sqlite3-9.18.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-sqlite3-9.18.7-1.1">bind-modules-sqlite3-9.18.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-utils-9.18.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-utils-9.18.7-1.1">bind-utils-9.18.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.</Note>
    </Notes>
    <CVE>CVE-2022-2795</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:bind-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-doc-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-bdbhpt-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-generic-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-ldap-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-mysql-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-perl-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-sqlite3-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-utils-9.18.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2795.html</URL>
        <Description>CVE-2022-2795</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203614</URL>
        <Description>SUSE Bug 1203614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205842</URL>
        <Description>SUSE Bug 1205842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209913</URL>
        <Description>SUSE Bug 1209913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process.</Note>
    </Notes>
    <CVE>CVE-2022-2881</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:bind-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-doc-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-bdbhpt-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-generic-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-ldap-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-mysql-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-perl-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-sqlite3-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-utils-9.18.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2881.html</URL>
        <Description>CVE-2022-2881</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203615</URL>
        <Description>SUSE Bug 1203615</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.</Note>
    </Notes>
    <CVE>CVE-2022-2906</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:bind-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-doc-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-bdbhpt-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-generic-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-ldap-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-mysql-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-perl-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-sqlite3-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-utils-9.18.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2906.html</URL>
        <Description>CVE-2022-2906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203616</URL>
        <Description>SUSE Bug 1203616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">By sending specific queries to the resolver, an attacker can cause named to crash.</Note>
    </Notes>
    <CVE>CVE-2022-3080</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:bind-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-doc-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-bdbhpt-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-generic-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-ldap-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-mysql-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-perl-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-sqlite3-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-utils-9.18.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3080.html</URL>
        <Description>CVE-2022-3080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203618</URL>
        <Description>SUSE Bug 1203618</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.</Note>
    </Notes>
    <CVE>CVE-2022-38178</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:bind-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-doc-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-bdbhpt-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-generic-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-ldap-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-mysql-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-perl-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-sqlite3-9.18.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-utils-9.18.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-38178.html</URL>
        <Description>CVE-2022-38178</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203620</URL>
        <Description>SUSE Bug 1203620</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
