#8362: bind-9.10.4-P3 bind-utils-9.10.4-P3 bind9
-------------------------+-------------------------
Reporter: renodr | Owner: blfs-book@…
Type: enhancement | Status: new
Priority: high | Milestone: 7.11
Component: BOOK | Version: SVN
Severity: normal | Keywords:
-------------------------+-------------------------
New minor version
*** SECURITY RELEASE ***
(Link to oss-security mailing list will be posted in a little bit)
[ftp://ftp.isc.org/isc/bind9/9.10.4-P3/RELEASE-NOTES-bind-9.10.4-P3.html]
{{{
BIND 9.10.4-P3 addresses the security issue described in CVE-2016-2776 and
addresses an interoperability issue with ECS clients.
}}}
{{{
Security Fixes
It was possible to trigger a assertion when rendering a message using
a specially crafted request. This flaw is disclosed in CVE-2016-2776. [RT
#43139]
getrrsetbyname with a non absolute name could trigger an infinite
recursion bug in lwresd and named with lwres configured if when combined
with a search list entry the resulting name is too long. This flaw is
disclosed in CVE-2016-2775. [RT #42694]
New Features
None.
Feature Changes
None.
Porting Changes
None.
Bug Fixes
ECS clients with the option set to 0.0.0.0/0/0 or ::/0/0 where
incorrectly getting a FORMERR response.
Windows installs were failing due to triggering UAC without the
installation binary being signed.
A race condition in rbt/rbtdb was leading to INSISTs being triggered.
}}}
[https://kb.isc.org/article/AA-01419]
{{{
CVE:
CVE-2016-2776
Document Version:
2.0
Posting date:
2016-09-27
Program Impacted:
BIND
Versions affected:
9.0.x -> 9.8.x, 9.9.0->9.9.9-P2, 9.9.3-S1->9.9.9-S3, 9.10.0->9.10.4-P2,
9.11.0a1->9.11.0rc1
Severity:
High
Exploitable:
Remotely
Description:
Testing by ISC has uncovered a critical error condition which can occur
when a nameserver is constructing a response. A defect in the rendering
of messages into packets can cause named to exit with an assertion failure
in buffer.c while constructing a response to a query that meets certain
criteria.
This assertion can be triggered even if the apparent source address isn't
allowed to make queries (i.e. doesn't match 'allow-query').
Impact:
All servers are vulnerable if they can receive request packets from any
source.
CVSS Score: 7.8
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C)
For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Workarounds:
No practical workarounds exist.
Active exploits:
No known active exploits.
Solution: Upgrade to the patched release most closely related to your
current version of BIND. These can all be downloaded from
http://www.isc.org/downloads.
BIND 9 version 9.9.9-P3
BIND 9 version 9.10.4-P3
BIND 9 version 9.11.0rc3
BIND 9 Supported Preview edition is a feature preview version of BIND
provided exclusively to eligible ISC Support customers.
BIND 9 version 9.9.9-S5
Document Revision History:
1.0 Advance Notification 2016-09-14
1.1 Added information about the Stable Preview release to versions
affected. Updated solution section to reflect replacing 9.11.0rc2 with
9.11.0rc3 and 9.9.9-S4 with 9.9.9-S5.
2.0 Posting date changed and public disclosure.
}}}
--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/8362>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
--
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page