{"affected":[{"ecosystem_specific":{"binaries":[{"bind-devel":"9.11.22-3.57.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.22-3.57.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"bind":"9.11.22-3.57.1","bind-chrootenv":"9.11.22-3.57.1","bind-doc":"9.11.22-3.57.1","bind-utils":"9.11.22-3.57.1","libbind9-161":"9.11.22-3.57.1","libdns1110":"9.11.22-3.57.1","libirs161":"9.11.22-3.57.1","libisc1107":"9.11.22-3.57.1","libisc1107-32bit":"9.11.22-3.57.1","libisccc161":"9.11.22-3.57.1","libisccfg163":"9.11.22-3.57.1","liblwres161":"9.11.22-3.57.1","python-bind":"9.11.22-3.57.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.22-3.57.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"bind":"9.11.22-3.57.1","bind-chrootenv":"9.11.22-3.57.1","bind-doc":"9.11.22-3.57.1","bind-utils":"9.11.22-3.57.1","libbind9-161":"9.11.22-3.57.1","libdns1110":"9.11.22-3.57.1","libirs161":"9.11.22-3.57.1","libisc1107":"9.11.22-3.57.1","libisc1107-32bit":"9.11.22-3.57.1","libisccc161":"9.11.22-3.57.1","libisccfg163":"9.11.22-3.57.1","liblwres161":"9.11.22-3.57.1","python-bind":"9.11.22-3.57.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.22-3.57.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for bind fixes the following issues:\n\nSecurity issues fixed:\n\n- It is possible to craft excessively large numbers of resource\n  record types for a given owner name, which has the effect of\n  slowing down database processing. This has been addressed by\n  only allowing a maximum of 100 records to be stored per name\n  and type in a cache or zone database. (CVE-2024-1737, bsc#1228256)\n- Validating DNS messages signed using the SIG(0) protocol (RFC\n  2931) could cause excessive CPU load, leading to a\n  denial-of-service condition. Support for SIG(0) message\n  validation was removed from this version of named.\n  (CVE-2024-1975, bsc#1228257)\n","id":"SUSE-SU-2024:2868-1","modified":"2024-08-09T13:32:01Z","published":"2024-08-09T13:32:01Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20242868-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1975"}],"related":["CVE-2024-1737","CVE-2024-1975"],"summary":"Security update for bind","upstream":["CVE-2024-1737","CVE-2024-1975"]}