Headline
Red Hat Security Advisory 2023-5526-01
Red Hat Security Advisory 2023-5526-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a denial of service vulnerability.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: bind security update
Advisory ID: RHSA-2023:5526-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:5526
Issue date: 2023-10-09
CVE Names: CVE-2023-3341
=====================================================================
- Summary:
An update for bind is now available for Red Hat Enterprise Linux 8.1 Update
Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux AppStream E4S (v. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS E4S (v. 8.1) - aarch64, ppc64le, s390x, x86_64
- Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
Security Fix(es):
- bind: stack exhaustion in control channel code may lead to DoS
(CVE-2023-3341)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, the BIND daemon (named) will be restarted
automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
2239621 - CVE-2023-3341 bind: stack exhaustion in control channel code may lead to DoS
- Package List:
Red Hat Enterprise Linux AppStream E4S (v. 8.1):
aarch64:
bind-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-chroot-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-devel-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-libs-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-libs-lite-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-lite-devel-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-devel-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-libs-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-utils-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-sdb-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-sdb-chroot-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-utils-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
noarch:
bind-license-9.11.4-26.P2.el8_1.8.noarch.rpm
python3-bind-9.11.4-26.P2.el8_1.8.noarch.rpm
ppc64le:
bind-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-chroot-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-devel-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-libs-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-libs-lite-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-lite-devel-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-devel-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-libs-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-utils-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-sdb-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-sdb-chroot-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-utils-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
s390x:
bind-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-chroot-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-devel-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-libs-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-libs-lite-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-lite-devel-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-devel-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-libs-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-utils-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-sdb-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-sdb-chroot-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-utils-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
x86_64:
bind-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-chroot-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.i686.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-devel-9.11.4-26.P2.el8_1.8.i686.rpm
bind-devel-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-libs-9.11.4-26.P2.el8_1.8.i686.rpm
bind-libs-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-libs-lite-9.11.4-26.P2.el8_1.8.i686.rpm
bind-libs-lite-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-lite-devel-9.11.4-26.P2.el8_1.8.i686.rpm
bind-lite-devel-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-devel-9.11.4-26.P2.el8_1.8.i686.rpm
bind-pkcs11-devel-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-libs-9.11.4-26.P2.el8_1.8.i686.rpm
bind-pkcs11-libs-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-utils-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-sdb-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-sdb-chroot-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-utils-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
Red Hat Enterprise Linux BaseOS E4S (v. 8.1):
Source:
bind-9.11.4-26.P2.el8_1.8.src.rpm
aarch64:
bind-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-export-devel-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-export-libs-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.aarch64.rpm
ppc64le:
bind-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-export-devel-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-export-libs-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.ppc64le.rpm
s390x:
bind-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-export-devel-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-export-libs-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.s390x.rpm
x86_64:
bind-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.i686.rpm
bind-debugsource-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-export-devel-9.11.4-26.P2.el8_1.8.i686.rpm
bind-export-devel-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-export-libs-9.11.4-26.P2.el8_1.8.i686.rpm
bind-export-libs-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-export-libs-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-libs-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-libs-lite-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-pkcs11-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-pkcs11-libs-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-pkcs11-utils-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-sdb-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.i686.rpm
bind-utils-debuginfo-9.11.4-26.P2.el8_1.8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2023-3341
https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCAAGBQJlJBvGAAoJENzjgjWX9erETy4P+wTqf6hhSXqBso+87ES8muOP
a9A9TTQ3dFtWv15vsbBV97b7ZLnGcJ4EahIAzyvr/YA5Rw/jsUMJZh/J45MRd8Xq
8c9S/8YaOU1kQkSzzthN6iWmwtDP5yuE6emidloCL8gr0ib4dKY29cym81Uat0vI
G5bAvCktAoJ7+sASVWzwbo3+zVjF65v9NpOIO0Ot1w1v96V1gfIuhyqcxSc1sb5H
dIMnyrIsUTT5DiEhy30qCWLCPrDIRWLrdTg0DUGWwl0Q8uoOlEEVr1UOEP9iBZMc
N8ZJ14S4/k0Saqjru7AMeKiN4BAB3UofuPxmlHhH8qjcAgn72kuJOIe/W+xEmLGH
wBo4B6MdyyhtxD9eqNmANFJiFIVSjzuxPkKA0UZHL6rbeNWGU2pqeEle4uMy3KsX
bnQNX8tLJ+o0qpBB9IpjeAE+6X41qaaaT4JBERftLb2xqUBv2MEt+NyPwlbf7Vit
rHkjBDVyYCtBm6EwaipUkEIXLr0/uHP6wnb610Vars6aP0e858EpzivSSv6mljLU
Hm/DHSf1kAx0+qjYEOK5kpbt0T8PaAt8UiWyTTo1v3+/oOLezHuUD0GHG/NcBzQ3
plSeTTDPTyaNhtqpHaWjQfeXeZT2nvFlAYWn+gPE0V+KSc9CCBCSPH+KYJO5Fsgj
a+VDjWB0wU6RWPcuDgx/
=u5EL
-----END PGP SIGNATURE-----
–
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Related news
Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system.
IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267484.
Red Hat Security Advisory 2023-5691-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-5527-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a denial of service vulnerability.
Ubuntu Security Notice 6421-1 - It was discovered that Bind incorrectly handled certain control channel messages. A remote attacker with access to the control channel could possibly use this issue to cause Bind to crash, resulting in a denial of service.
An update for bind is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3341: A flaw was found in the Bind package. The code that processes control channel messages sent to named calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size. Depending on the environment, this may cause the packet-parsing code to run out of ava...
An update for bind is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3341: A flaw was found in the Bind package. The code that processes control channel messages sent to named calls certain functions recursively during packet parsing. Recursion depth ...
Red Hat Security Advisory 2023-5474-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-5473-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a denial of service vulnerability.
Debian Linux Security Advisory 5504-1 - Several vulnerabilities were discovered in BIND, a DNS server implementation.
Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could be exploited to achieve denial-of-service (DoS) and remote code execution. The Australian software services provider said that the four high-severity flaws were fixed in new versions shipped last month. This includes - CVE-2022-25647 (CVSS score: 7.5) - A deserialization
Ubuntu Security Notice 6390-1 - It was discovered that Bind incorrectly handled certain control channel messages. A remote attacker with access to the control channel could possibly use this issue to cause Bind to crash, resulting in a denial of service. Robert Story discovered that Bind incorrectly handled certain DNS-over-TLS queries. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.