Jump to content
Compatible Support Forums
Sign in to follow this  
news

[RHSA-2016:0079-01] Important: bind security update

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

=====================================================================

Red Hat Security Advisory

 

Synopsis: Important: bind security update

Advisory ID: RHSA-2016:0079-01

Product: Red Hat Enterprise Linux

Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0079.html

Issue date: 2016-01-28

CVE Names: CVE-2015-5477 CVE-2015-5722 CVE-2015-8000

=====================================================================

 

1. Summary:

 

Updated bind packages that fix three security issues are now available for

Red Hat Enterprise Linux 6.6 Extended Update Support.

 

Red Hat Product Security has rated this update as having Important security

impact. Common Vulnerability Scoring System (CVSS) base scores, which give

detailed severity ratings, are available for each vulnerability from the

CVE links in the References section.

 

2. Relevant releases/architectures:

 

Red Hat Enterprise Linux HPC Node EUS (v. 6.6) - x86_64

Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6) - x86_64

Red Hat Enterprise Linux Server EUS (v. 6.6) - i386, ppc64, s390x, x86_64

Red Hat Enterprise Linux Server Optional EUS (v. 6.6) - i386, ppc64, s390x, x86_64

 

3. Description:

 

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain

Name System (DNS) protocols. BIND includes a DNS server (named); a resolver

library (routines for applications to use when interfacing with DNS); and

tools for verifying that the DNS server is operating correctly.

 

A flaw was found in the way BIND handled requests for TKEY DNS resource

records. A remote attacker could use this flaw to make named (functioning

as an authoritative DNS server or a DNS resolver) exit unexpectedly with an

assertion failure via a specially crafted DNS request packet.

(CVE-2015-5477)

 

A denial of service flaw was found in the way BIND parsed certain malformed

DNSSEC keys. A remote attacker could use this flaw to send a specially

crafted DNS query (for example, a query requiring a response from a zone

containing a deliberately malformed key) that would cause named functioning

as a vali[censored] resolver to crash. (CVE-2015-5722)

 

A denial of service flaw was found in the way BIND processed certain

records with malformed class attributes. A remote attacker could use this

flaw to send a query to request a cached record with a malformed class

attribute that would cause named functioning as an authoritative or

recursive server to crash. (CVE-2015-8000)

 

Note: This issue affects authoritative servers as well as recursive

servers, however authoritative servers are at limited risk if they perform

authentication when making recursive queries to resolve addresses for

servers listed in NS RRSETs.

 

Red Hat would like to thank ISC for reporting the CVE-2015-5477,

CVE-2015-5722, and CVE-2015-8000 issues. Upstream acknowledges Jonathan

Foote as the original reporter of CVE-2015-5477, and Hanno Böck as the

original reporter of CVE-2015-5722.

 

All bind users are advised to upgrade to these updated packages, which

contain backported patches to correct these issues. After installing the

update, the BIND daemon (named) will be restarted automatically.

 

4. Solution:

 

Before applying this update, make sure all previously released errata

relevant to your system have been applied.

 

For details on how to apply this update, refer to:

 

https://access.redhat.com/articles/11258

 

5. Bugs fixed (https://bugzilla.redhat.com/):

 

1247361 - CVE-2015-5477 bind: TKEY query handling flaw leading to denial of service

1259087 - CVE-2015-5722 bind: malformed DNSSEC key failed assertion denial of service

1291176 - CVE-2015-8000 bind: responses with a malformed class attribute can trigger an assertion failure in db.c

 

6. Package List:

 

Red Hat Enterprise Linux HPC Node EUS (v. 6.6):

 

Source:

bind-9.8.2-0.30.rc1.el6_6.4.src.rpm

 

x86_64:

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-libs-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-libs-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-utils-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

 

Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6):

 

x86_64:

bind-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-chroot-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-devel-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-devel-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-sdb-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

 

Red Hat Enterprise Linux Server EUS (v. 6.6):

 

Source:

bind-9.8.2-0.30.rc1.el6_6.4.src.rpm

 

i386:

bind-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-chroot-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-libs-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-utils-9.8.2-0.30.rc1.el6_6.4.i686.rpm

 

ppc64:

bind-9.8.2-0.30.rc1.el6_6.4.ppc64.rpm

bind-chroot-9.8.2-0.30.rc1.el6_6.4.ppc64.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.ppc.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.ppc64.rpm

bind-libs-9.8.2-0.30.rc1.el6_6.4.ppc.rpm

bind-libs-9.8.2-0.30.rc1.el6_6.4.ppc64.rpm

bind-utils-9.8.2-0.30.rc1.el6_6.4.ppc64.rpm

 

s390x:

bind-9.8.2-0.30.rc1.el6_6.4.s390x.rpm

bind-chroot-9.8.2-0.30.rc1.el6_6.4.s390x.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.s390.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.s390x.rpm

bind-libs-9.8.2-0.30.rc1.el6_6.4.s390.rpm

bind-libs-9.8.2-0.30.rc1.el6_6.4.s390x.rpm

bind-utils-9.8.2-0.30.rc1.el6_6.4.s390x.rpm

 

x86_64:

bind-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-chroot-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-libs-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-libs-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-utils-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

 

Red Hat Enterprise Linux Server Optional EUS (v. 6.6):

 

i386:

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-devel-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-sdb-9.8.2-0.30.rc1.el6_6.4.i686.rpm

 

ppc64:

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.ppc.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.ppc64.rpm

bind-devel-9.8.2-0.30.rc1.el6_6.4.ppc.rpm

bind-devel-9.8.2-0.30.rc1.el6_6.4.ppc64.rpm

bind-sdb-9.8.2-0.30.rc1.el6_6.4.ppc64.rpm

 

s390x:

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.s390.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.s390x.rpm

bind-devel-9.8.2-0.30.rc1.el6_6.4.s390.rpm

bind-devel-9.8.2-0.30.rc1.el6_6.4.s390x.rpm

bind-sdb-9.8.2-0.30.rc1.el6_6.4.s390x.rpm

 

x86_64:

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-debuginfo-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-devel-9.8.2-0.30.rc1.el6_6.4.i686.rpm

bind-devel-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

bind-sdb-9.8.2-0.30.rc1.el6_6.4.x86_64.rpm

 

These packages are GPG signed by Red Hat for security. Our key and

details on how to verify the signature are available from

https://access.redhat.com/security/team/key/

 

7. References:

 

https://access.redhat.com/security/cve/CVE-2015-5477

https://access.redhat.com/security/cve/CVE-2015-5722

https://access.redhat.com/security/cve/CVE-2015-8000

https://access.redhat.com/security/updates/classification/#important

https://kb.isc.org/article/AA-01272

https://kb.isc.org/article/AA-01287

https://kb.isc.org/article/AA-01317

 

8. Contact:

 

The Red Hat security contact is . More contact

details at https://access.redhat.com/security/team/contact/

 

Copyright 2016 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1

 

iD8DBQFWqh1xXlSAg2UNWIIRAp7CAJ9w8AmBLVorEliRxhkdVPJGa2ylCgCgvfMl

uToGAGXXJzZZlOm00ysafoo=

=G0Vs

-----END PGP SIGNATURE-----

 

 

--

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×