<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">bind-9.20.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:14217-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-07-26T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-07-26T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-07-26T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">bind-9.20.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the bind-9.20.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-14217</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0760/</URL>
      <Description>SUSE CVE CVE-2024-0760 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-1737/</URL>
      <Description>SUSE CVE CVE-2024-1737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-1975/</URL>
      <Description>SUSE CVE CVE-2024-1975 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-4076/</URL>
      <Description>SUSE CVE CVE-2024-4076 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="bind-9.20.0-1.1">
      <FullProductName ProductID="bind-9.20.0-1.1">bind-9.20.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-doc-9.20.0-1.1">
      <FullProductName ProductID="bind-doc-9.20.0-1.1">bind-doc-9.20.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-bdbhpt-9.20.0-1.1">
      <FullProductName ProductID="bind-modules-bdbhpt-9.20.0-1.1">bind-modules-bdbhpt-9.20.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-generic-9.20.0-1.1">
      <FullProductName ProductID="bind-modules-generic-9.20.0-1.1">bind-modules-generic-9.20.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-ldap-9.20.0-1.1">
      <FullProductName ProductID="bind-modules-ldap-9.20.0-1.1">bind-modules-ldap-9.20.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-mysql-9.20.0-1.1">
      <FullProductName ProductID="bind-modules-mysql-9.20.0-1.1">bind-modules-mysql-9.20.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-perl-9.20.0-1.1">
      <FullProductName ProductID="bind-modules-perl-9.20.0-1.1">bind-modules-perl-9.20.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-modules-sqlite3-9.20.0-1.1">
      <FullProductName ProductID="bind-modules-sqlite3-9.20.0-1.1">bind-modules-sqlite3-9.20.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-utils-9.20.0-1.1">
      <FullProductName ProductID="bind-utils-9.20.0-1.1">bind-utils-9.20.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="bind-9.20.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-9.20.0-1.1">bind-9.20.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-doc-9.20.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-doc-9.20.0-1.1">bind-doc-9.20.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-bdbhpt-9.20.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-bdbhpt-9.20.0-1.1">bind-modules-bdbhpt-9.20.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-generic-9.20.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-generic-9.20.0-1.1">bind-modules-generic-9.20.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-ldap-9.20.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-ldap-9.20.0-1.1">bind-modules-ldap-9.20.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-mysql-9.20.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-mysql-9.20.0-1.1">bind-modules-mysql-9.20.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-perl-9.20.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-perl-9.20.0-1.1">bind-modules-perl-9.20.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-modules-sqlite3-9.20.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-modules-sqlite3-9.20.0-1.1">bind-modules-sqlite3-9.20.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-utils-9.20.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:bind-utils-9.20.0-1.1">bind-utils-9.20.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. 
This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.</Note>
    </Notes>
    <CVE>CVE-2024-0760</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:bind-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-doc-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-bdbhpt-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-generic-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-ldap-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-mysql-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-perl-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-sqlite3-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-utils-9.20.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0760.html</URL>
        <Description>CVE-2024-0760</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228255</URL>
        <Description>SUSE Bug 1228255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name.
This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.</Note>
    </Notes>
    <CVE>CVE-2024-1737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:bind-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-doc-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-bdbhpt-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-generic-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-ldap-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-mysql-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-perl-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-sqlite3-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-utils-9.20.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-1737.html</URL>
        <Description>CVE-2024-1737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228256</URL>
        <Description>SUSE Bug 1228256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests.
This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.</Note>
    </Notes>
    <CVE>CVE-2024-1975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:bind-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-doc-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-bdbhpt-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-generic-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-ldap-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-mysql-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-perl-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-sqlite3-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-utils-9.20.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-1975.html</URL>
        <Description>CVE-2024-1975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228257</URL>
        <Description>SUSE Bug 1228257</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure.
This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.</Note>
    </Notes>
    <CVE>CVE-2024-4076</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:bind-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-doc-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-bdbhpt-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-generic-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-ldap-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-mysql-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-perl-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-modules-sqlite3-9.20.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:bind-utils-9.20.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-4076.html</URL>
        <Description>CVE-2024-4076</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228258</URL>
        <Description>SUSE Bug 1228258</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
