Anolis OS update for bind



| Updated: 2025-03-28
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-25220
CVE-2022-2795
CWE-ID CWE-350
CWE-399
Exploitation vector Network
Public exploit N/A
Vulnerable software
Anolis OS
Operating systems & Components / Operating system

bind-license
Operating systems & Components / Operating system package or component

bind-utils
Operating systems & Components / Operating system package or component

bind-sdb-chroot
Operating systems & Components / Operating system package or component

bind-sdb
Operating systems & Components / Operating system package or component

bind-pkcs11-utils
Operating systems & Components / Operating system package or component

bind-pkcs11-libs
Operating systems & Components / Operating system package or component

bind-pkcs11-devel
Operating systems & Components / Operating system package or component

bind-pkcs11
Operating systems & Components / Operating system package or component

bind-lite-devel
Operating systems & Components / Operating system package or component

bind-libs-lite
Operating systems & Components / Operating system package or component

bind-libs
Operating systems & Components / Operating system package or component

bind-export-libs
Operating systems & Components / Operating system package or component

bind-export-devel
Operating systems & Components / Operating system package or component

bind-devel
Operating systems & Components / Operating system package or component

bind-chroot
Operating systems & Components / Operating system package or component

bind
Operating systems & Components / Operating system package or component

Vendor OpenAnolis

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Reliance on Reverse DNS Resolution for a Security-Critical Action

EUVDB-ID: #VU61422

Risk: Medium

CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-25220

CWE-ID: CWE-350 - Reliance on Reverse DNS Resolution for a Security-Critical Action

Exploit availability: No

Description

The vulnerability allows a remote attacker to poison DNS cache.

The vulnerability exists due to an error in DNS forwarder implementation. When using forwarders, bogus NS records supplied by, or via, those forwarders may be cached and used by named if it needs to recurse for any reason, causing it to obtain and pass on potentially incorrect answers. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.


Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 7

bind-license: before 9.11.4-26.P2

bind-utils: before 9.11.4-26.P2

bind-sdb-chroot: before 9.11.4-26.P2

bind-sdb: before 9.11.4-26.P2

bind-pkcs11-utils: before 9.11.4-26.P2

bind-pkcs11-libs: before 9.11.4-26.P2

bind-pkcs11-devel: before 9.11.4-26.P2

bind-pkcs11: before 9.11.4-26.P2

bind-lite-devel: before 9.11.4-26.P2

bind-libs-lite: before 9.11.4-26.P2

bind-libs: before 9.11.4-26.P2

bind-export-libs: before 9.11.4-26.P2

bind-export-devel: before 9.11.4-26.P2

bind-devel: before 9.11.4-26.P2

bind-chroot: before 9.11.4-26.P2

bind: before 9.11.4-26.P2

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0023


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource management error

EUVDB-ID: #VU67545

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-2795

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the application when processing large delegations. A remote attacker can flood the target resolver with queries and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 7

bind-license: before 9.11.4-26.P2

bind-utils: before 9.11.4-26.P2

bind-sdb-chroot: before 9.11.4-26.P2

bind-sdb: before 9.11.4-26.P2

bind-pkcs11-utils: before 9.11.4-26.P2

bind-pkcs11-libs: before 9.11.4-26.P2

bind-pkcs11-devel: before 9.11.4-26.P2

bind-pkcs11: before 9.11.4-26.P2

bind-lite-devel: before 9.11.4-26.P2

bind-libs-lite: before 9.11.4-26.P2

bind-libs: before 9.11.4-26.P2

bind-export-libs: before 9.11.4-26.P2

bind-export-devel: before 9.11.4-26.P2

bind-devel: before 9.11.4-26.P2

bind-chroot: before 9.11.4-26.P2

bind: before 9.11.4-26.P2

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2023:0023


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###