vulnerability

Amazon Linux 2023: CVE-2022-3488: Important priority package update for bind

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Jan 25, 2023
Added
Feb 17, 2025
Modified
Jul 4, 2025

Description

Processing of repeated responses to the same query, where both responses contain ECS pseudo-options, but where the first is broken in some way, can cause BIND to exit with an assertion failure.
'Broken' in this context is anything that would cause the resolver to reject the query response, such as a mismatch between query and answer name.
This issue affects BIND 9 versions 9.11.4-S1 through 9.11.37-S1 and 9.16.8-S1 through 9.16.36-S1.

Solutions

amazon-linux-2023-upgrade-bindamazon-linux-2023-upgrade-bind-chrootamazon-linux-2023-upgrade-bind-debuginfoamazon-linux-2023-upgrade-bind-debugsourceamazon-linux-2023-upgrade-bind-develamazon-linux-2023-upgrade-bind-dlz-filesystemamazon-linux-2023-upgrade-bind-dlz-filesystem-debuginfoamazon-linux-2023-upgrade-bind-dlz-ldapamazon-linux-2023-upgrade-bind-dlz-ldap-debuginfoamazon-linux-2023-upgrade-bind-dlz-mysqlamazon-linux-2023-upgrade-bind-dlz-mysql-debuginfoamazon-linux-2023-upgrade-bind-dlz-sqlite3amazon-linux-2023-upgrade-bind-dlz-sqlite3-debuginfoamazon-linux-2023-upgrade-bind-dnssec-docamazon-linux-2023-upgrade-bind-dnssec-utilsamazon-linux-2023-upgrade-bind-dnssec-utils-debuginfoamazon-linux-2023-upgrade-bind-libsamazon-linux-2023-upgrade-bind-libs-debuginfoamazon-linux-2023-upgrade-bind-licenseamazon-linux-2023-upgrade-bind-pkcs11amazon-linux-2023-upgrade-bind-pkcs11-debuginfoamazon-linux-2023-upgrade-bind-pkcs11-develamazon-linux-2023-upgrade-bind-pkcs11-libsamazon-linux-2023-upgrade-bind-pkcs11-libs-debuginfoamazon-linux-2023-upgrade-bind-pkcs11-utilsamazon-linux-2023-upgrade-bind-pkcs11-utils-debuginfoamazon-linux-2023-upgrade-bind-utilsamazon-linux-2023-upgrade-bind-utils-debuginfoamazon-linux-2023-upgrade-python3-bind
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.