You are here
Home > Preporuke > Ranjivost programskog paketa bind

Ranjivost programskog paketa bind

SUSE Security Update: Security update for bind
______________________________________________________________________________

Announcement ID: SUSE-SU-2015:0011-1
Rating: important
References: #743758 #882511 #908994
Cross-References: CVE-2014-8500
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

An update that solves one vulnerability and has two fixes
is now available. It includes one version update.

Description:

bind has been updated to version 9.9.6P1, fixing the following security
issue:

* A flaw in delegation handling could be exploited to put named into
an infinite loop. This has been addressed by placing limits on the
number of levels of recursion named will allow (default 7), and the
number of iterative queries that it will send (default 50) before
terminating a recursive query (CVE-2014-8500, bnc#908994).
* The recursion depth limit is configured via the “max-recursion-depth”
option, and the query limit via the “max-recursion-queries” option.

Additionally, two non-security issues have been fixed:

* bnc#882511: Fix a multi-thread issue with IXFR.
* bnc#743758: Fix handling of TXT records in ldapdump.

Security Issues:

* CVE-2014-8500
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500>

Indications:

Everybody should update.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Software Development Kit 11 SP3:

zypper in -t patch sdksp3-bind-10100

– SUSE Linux Enterprise Server 11 SP3 for VMware:

zypper in -t patch slessp3-bind-10100

– SUSE Linux Enterprise Server 11 SP3:

zypper in -t patch slessp3-bind-10100

– SUSE Linux Enterprise Desktop 11 SP3:

zypper in -t patch sledsp3-bind-10100

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 9.9.6P1]:

bind-devel-9.9.6P1-0.5.1

– SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64) [New Version: 9.9.6P1]:

bind-devel-32bit-9.9.6P1-0.5.1

– SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 9.9.6P1]:

bind-9.9.6P1-0.5.1
bind-chrootenv-9.9.6P1-0.5.1
bind-doc-9.9.6P1-0.5.1
bind-libs-9.9.6P1-0.5.1
bind-utils-9.9.6P1-0.5.1

– SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64) [New Version: 9.9.6P1]:

bind-libs-32bit-9.9.6P1-0.5.1

– SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 9.9.6P1]:

bind-9.9.6P1-0.5.1
bind-chrootenv-9.9.6P1-0.5.1
bind-doc-9.9.6P1-0.5.1
bind-libs-9.9.6P1-0.5.1
bind-utils-9.9.6P1-0.5.1

– SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64) [New Version: 9.9.6P1]:

bind-libs-32bit-9.9.6P1-0.5.1

– SUSE Linux Enterprise Server 11 SP3 (ia64) [New Version: 9.9.6P1]:

bind-libs-x86-9.9.6P1-0.5.1

– SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 9.9.6P1]:

bind-libs-9.9.6P1-0.5.1
bind-utils-9.9.6P1-0.5.1

– SUSE Linux Enterprise Desktop 11 SP3 (x86_64) [New Version: 9.9.6P1]:

bind-libs-32bit-9.9.6P1-0.5.1

References:

http://support.novell.com/security/cve/CVE-2014-8500.html
https://bugzilla.suse.com/show_bug.cgi?id=743758
https://bugzilla.suse.com/show_bug.cgi?id=882511
https://bugzilla.suse.com/show_bug.cgi?id=908994
http://download.suse.com/patch/finder/?keywords=0260c778aca79758010e65db535ef099


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

 

 

SUSE Security Update: Security update for bind
______________________________________________________________________________

Announcement ID: SUSE-SU-2015:0011-2
Rating: important
References: #743758 #882511 #908994
Cross-References: CVE-2014-8500
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
______________________________________________________________________________

An update that solves one vulnerability and has two fixes
is now available. It includes one version update.

Description:

This update provides bind 9.9.6P1, which fixes a defect in delegation
handling that could be exploited to crash named. (CVE-2014-8500,
bsc#908994)

Additionally, two non-security issues have been fixed:

* Fix handling of TXT records in ldapdump. (bsc#743758)
* Fix a multithread issue with IXFR. (bsc#882511)

Security Issues:

* CVE-2014-8500
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500>

Indications:

Everybody should update.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 11 SP2 LTSS:

zypper in -t patch slessp2-bind=10203

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64) [New Version: 9.9.6P1]:

bind-9.9.6P1-0.5.5
bind-chrootenv-9.9.6P1-0.5.5
bind-devel-9.9.6P1-0.5.5
bind-doc-9.9.6P1-0.5.5
bind-libs-9.9.6P1-0.5.5
bind-utils-9.9.6P1-0.5.5

– SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64) [New Version: 9.9.6P1]:

bind-libs-32bit-9.9.6P1-0.5.5

References:

http://support.novell.com/security/cve/CVE-2014-8500.html
https://bugzilla.suse.com/743758
https://bugzilla.suse.com/882511
https://bugzilla.suse.com/908994
http://download.suse.com/patch/finder/?keywords=93a0d67b3fb1cddabb9d852b78c4e9a4

— To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa jasper

Otkriveni su sigurnosni nedostaci u programskom paketu jasper za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close