Critical: bind

2015-09-02T13:05:00
ID ALAS-2015-594
Type amazon
Reporter Amazon
Modified 2015-09-02T13:05:00

Description

Issue Overview:

As discussed upstream, parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key. (CVE-2015-5722 __)

Also disclosed upstream today was CVE-2015-5986 __ which does not impact the version of bind in the Amazon Linux AMI.

Affected Packages:

bind

Issue Correction:
Run yum update bind to update your system.

New Packages:

i686:  
    bind-9.8.2-0.30.rc1.39.amzn1.i686  
    bind-libs-9.8.2-0.30.rc1.39.amzn1.i686  
    bind-sdb-9.8.2-0.30.rc1.39.amzn1.i686  
    bind-devel-9.8.2-0.30.rc1.39.amzn1.i686  
    bind-debuginfo-9.8.2-0.30.rc1.39.amzn1.i686  
    bind-chroot-9.8.2-0.30.rc1.39.amzn1.i686  
    bind-utils-9.8.2-0.30.rc1.39.amzn1.i686

src:  
    bind-9.8.2-0.30.rc1.39.amzn1.src

x86_64:  
    bind-sdb-9.8.2-0.30.rc1.39.amzn1.x86_64  
    bind-chroot-9.8.2-0.30.rc1.39.amzn1.x86_64  
    bind-debuginfo-9.8.2-0.30.rc1.39.amzn1.x86_64  
    bind-devel-9.8.2-0.30.rc1.39.amzn1.x86_64  
    bind-9.8.2-0.30.rc1.39.amzn1.x86_64  
    bind-utils-9.8.2-0.30.rc1.39.amzn1.x86_64  
    bind-libs-9.8.2-0.30.rc1.39.amzn1.x86_64