Описание
Security update for bind
This update for bind fixes the following issues:
Fix two assertion failures that can lead to a remote denial of service attack:
- CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
- CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
Список пакетов
SUSE Linux Enterprise Desktop 11 SP4
bind-libs-9.9.6P1-0.25.1
bind-libs-32bit-9.9.6P1-0.25.1
bind-utils-9.9.6P1-0.25.1
SUSE Linux Enterprise Server 11 SP2-LTSS
bind-9.9.6P1-0.25.1
bind-chrootenv-9.9.6P1-0.25.1
bind-devel-9.9.6P1-0.25.1
bind-doc-9.9.6P1-0.25.1
bind-libs-9.9.6P1-0.25.1
bind-libs-32bit-9.9.6P1-0.25.1
bind-utils-9.9.6P1-0.25.1
SUSE Linux Enterprise Server 11 SP3-LTSS
bind-9.9.6P1-0.25.1
bind-chrootenv-9.9.6P1-0.25.1
bind-doc-9.9.6P1-0.25.1
bind-libs-9.9.6P1-0.25.1
bind-libs-32bit-9.9.6P1-0.25.1
bind-utils-9.9.6P1-0.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
bind-9.9.6P1-0.25.1
bind-chrootenv-9.9.6P1-0.25.1
bind-doc-9.9.6P1-0.25.1
bind-libs-9.9.6P1-0.25.1
bind-libs-32bit-9.9.6P1-0.25.1
bind-utils-9.9.6P1-0.25.1
SUSE Linux Enterprise Server 11 SP4
bind-9.9.6P1-0.25.1
bind-chrootenv-9.9.6P1-0.25.1
bind-doc-9.9.6P1-0.25.1
bind-libs-9.9.6P1-0.25.1
bind-libs-32bit-9.9.6P1-0.25.1
bind-libs-x86-9.9.6P1-0.25.1
bind-utils-9.9.6P1-0.25.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
bind-9.9.6P1-0.25.1
bind-chrootenv-9.9.6P1-0.25.1
bind-doc-9.9.6P1-0.25.1
bind-libs-9.9.6P1-0.25.1
bind-libs-32bit-9.9.6P1-0.25.1
bind-libs-x86-9.9.6P1-0.25.1
bind-utils-9.9.6P1-0.25.1
SUSE Linux Enterprise Software Development Kit 11 SP4
bind-devel-9.9.6P1-0.25.1
bind-devel-32bit-9.9.6P1-0.25.1
Ссылки
- Link for SUSE-SU-2016:0825-1
- E-Mail link for SUSE-SU-2016:0825-1
- SUSE Security Ratings
- SUSE Bug 970072
- SUSE Bug 970073
- SUSE CVE CVE-2016-1285 page
- SUSE CVE CVE-2016-1286 page
Описание
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP4:bind-libs-32bit-9.9.6P1-0.25.1
SUSE Linux Enterprise Desktop 11 SP4:bind-libs-9.9.6P1-0.25.1
SUSE Linux Enterprise Desktop 11 SP4:bind-utils-9.9.6P1-0.25.1
SUSE Linux Enterprise Server 11 SP2-LTSS:bind-9.9.6P1-0.25.1
Ссылки
- CVE-2016-1285
- SUSE Bug 970072
- SUSE Bug 981200
Описание
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP4:bind-libs-32bit-9.9.6P1-0.25.1
SUSE Linux Enterprise Desktop 11 SP4:bind-libs-9.9.6P1-0.25.1
SUSE Linux Enterprise Desktop 11 SP4:bind-utils-9.9.6P1-0.25.1
SUSE Linux Enterprise Server 11 SP2-LTSS:bind-9.9.6P1-0.25.1
Ссылки
- CVE-2016-1286
- SUSE Bug 970073
- SUSE Bug 981200