Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2021:0668-1

Опубликовано: 04 мая 2021
Источник: suse-cvrf

Описание

Security update for bind

This update for bind fixes the following issues:

  • CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
  • CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
  • make /usr/bin/delv in bind-tools position independent (bsc#1183453).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.2
bind-9.16.6-lp152.14.19.1
bind-chrootenv-9.16.6-lp152.14.19.1
bind-devel-9.16.6-lp152.14.19.1
bind-devel-32bit-9.16.6-lp152.14.19.1
bind-doc-9.16.6-lp152.14.19.1
bind-utils-9.16.6-lp152.14.19.1
libbind9-1600-9.16.6-lp152.14.19.1
libbind9-1600-32bit-9.16.6-lp152.14.19.1
libdns1605-9.16.6-lp152.14.19.1
libdns1605-32bit-9.16.6-lp152.14.19.1
libirs-devel-9.16.6-lp152.14.19.1
libirs1601-9.16.6-lp152.14.19.1
libirs1601-32bit-9.16.6-lp152.14.19.1
libisc1606-9.16.6-lp152.14.19.1
libisc1606-32bit-9.16.6-lp152.14.19.1
libisccc1600-9.16.6-lp152.14.19.1
libisccc1600-32bit-9.16.6-lp152.14.19.1
libisccfg1600-9.16.6-lp152.14.19.1
libisccfg1600-32bit-9.16.6-lp152.14.19.1
libns1604-9.16.6-lp152.14.19.1
libns1604-32bit-9.16.6-lp152.14.19.1
python3-bind-9.16.6-lp152.14.19.1

Описание

In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.


Затронутые продукты
openSUSE Leap 15.2:bind-9.16.6-lp152.14.19.1
openSUSE Leap 15.2:bind-chrootenv-9.16.6-lp152.14.19.1
openSUSE Leap 15.2:bind-devel-32bit-9.16.6-lp152.14.19.1
openSUSE Leap 15.2:bind-devel-9.16.6-lp152.14.19.1

Ссылки

Описание

In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.


Затронутые продукты
openSUSE Leap 15.2:bind-9.16.6-lp152.14.19.1
openSUSE Leap 15.2:bind-chrootenv-9.16.6-lp152.14.19.1
openSUSE Leap 15.2:bind-devel-32bit-9.16.6-lp152.14.19.1
openSUSE Leap 15.2:bind-devel-9.16.6-lp152.14.19.1

Ссылки
Уязвимость openSUSE-SU-2021:0668-1