Lucene search

K
slackwareSlackware Linux ProjectSSA-2020-140-01
HistoryMay 19, 2020 - 8:19 p.m.

[slackware-security] bind

2020-05-1920:19:54
Slackware Linux Project
www.slackware.com
35

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.972 High

EPSS

Percentile

99.8%

New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:

patches/packages/bind-9.11.19-i586-1_slack14.2.txz: Upgraded.
This update fixes security issues:
A malicious actor who intentionally exploits the lack of effective
limitation on the number of fetches performed when processing referrals
can, through the use of specially crafted referrals, cause a recursing
server to issue a very large number of fetches in an attempt to process
the referral. This has at least two potential effects: The performance of
the recursing server can potentially be degraded by the additional work
required to perform these fetches, and the attacker can exploit this
behavior to use the recursing server as a reflector in a reflection attack
with a high amplification factor.
Replaying a TSIG BADTIME response as a request could trigger an assertion
failure.
For more information, see:
https://kb.isc.org/docs/cve-2020-8616
https://vulners.com/cve/CVE-2020-8616
https://kb.isc.org/docs/cve-2020-8617
https://vulners.com/cve/CVE-2020-8617
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.19-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.19-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.19-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.19-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.19-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.19-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.16.3-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.16.3-x86_64-1.txz

MD5 signatures:

Slackware 14.0 package:
8a8be89119053b4cf308e94c39b0441f bind-9.11.19-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
c1ff5217ff073769862204f708bfc969 bind-9.11.19-x86_64-1_slack14.0.txz

Slackware 14.1 package:
08b6ff961e66d98a4a3cab7dc6485c83 bind-9.11.19-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
28421755e2c614bbfba77ad5d19ed95a bind-9.11.19-x86_64-1_slack14.1.txz

Slackware 14.2 package:
3def6c8b8115e1b5eb199281dd7bd6c7 bind-9.11.19-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
1533854201484c39c4d6d13a0b0ac246 bind-9.11.19-x86_64-1_slack14.2.txz

Slackware -current package:
1d0111759a7622d5341a3acb620d42a8 n/bind-9.16.3-i586-1.txz

Slackware x86_64 -current package:
f22d2d2b35b461bca96df936a65fc4dc n/bind-9.16.3-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg bind-9.11.19-i586-1_slack14.2.txz

Then, restart the name server:

> /etc/rc.d/rc.bind restart

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.972 High

EPSS

Percentile

99.8%