{"affected":[{"ecosystem_specific":{"binaries":[{"bind-devel":"9.11.22-3.52.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.22-3.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"bind":"9.11.22-3.52.1","bind-chrootenv":"9.11.22-3.52.1","bind-doc":"9.11.22-3.52.1","bind-utils":"9.11.22-3.52.1","libbind9-161":"9.11.22-3.52.1","libdns1110":"9.11.22-3.52.1","libirs161":"9.11.22-3.52.1","libisc1107":"9.11.22-3.52.1","libisc1107-32bit":"9.11.22-3.52.1","libisccc161":"9.11.22-3.52.1","libisccfg163":"9.11.22-3.52.1","liblwres161":"9.11.22-3.52.1","python-bind":"9.11.22-3.52.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.22-3.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"bind":"9.11.22-3.52.1","bind-chrootenv":"9.11.22-3.52.1","bind-doc":"9.11.22-3.52.1","bind-utils":"9.11.22-3.52.1","libbind9-161":"9.11.22-3.52.1","libdns1110":"9.11.22-3.52.1","libirs161":"9.11.22-3.52.1","libisc1107":"9.11.22-3.52.1","libisc1107-32bit":"9.11.22-3.52.1","libisccc161":"9.11.22-3.52.1","libisccfg163":"9.11.22-3.52.1","liblwres161":"9.11.22-3.52.1","python-bind":"9.11.22-3.52.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.22-3.52.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for bind fixes the following issues:\n\n- CVE-2023-50387: Fixed validating DNS messages containing a lot of DNSSEC signatures that could have let to a denial-of-service (bsc#1219823).\n- CVE-2023-50868: Fixed NSEC3 closest encloser proof that could have let to a denial-of-service (bsc#1219826).\n- CVE-2023-4408: Fixed parsing DNS messages with many different names that could have let to a denial-of-service (bsc#1219851).\n","id":"SUSE-SU-2024:1894-1","modified":"2024-06-03T06:58:27Z","published":"2024-06-03T06:58:27Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241894-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219826"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4408"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-50387"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-50868"}],"related":["CVE-2023-4408","CVE-2023-50387","CVE-2023-50868"],"summary":"Security update for bind","upstream":["CVE-2023-4408","CVE-2023-50387","CVE-2023-50868"]}