A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec`) enabled can be remotely terminated using a zone with a malformed NSEC record. This issue affects BIND 9 versions 9.16.8-S1 through 9.16.41-S1 and 9.18.11-S1 through 9.18.15-S1. https://kb.isc.org/docs/cve-2023-2829
Created bind tracking bugs for this issue: Affects: fedora-37 [bug 2216623] Affects: fedora-38 [bug 2216625] Created dhcp tracking bugs for this issue: Affects: fedora-37 [bug 2216624]
According to upstream article [1] this is only affecting supported preview version. We do not have it in RHEL or even in Fedora. That is also why upstream release notes [2] of latest 9.16 does not mention this vulnerability. We are not affected by this one. In any release or component. Nor have a change to backport. Can all those bugs be closed? 1. https://kb.isc.org/docs/cve-2023-2829 2. https://downloads.isc.org/isc/bind9/9.16.42/doc/arm/html/notes.html#security-fixes
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-2829