bind-9.11.20-5.el8.1
エラータID: AXSA:2021-1540:03
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2020-8625
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch
Update packages.
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch
N/A
SRPMS
- bind-9.11.20-5.el8.1.src.rpm
MD5: 288b1dd69cc1ce77d8f714ee9a4a99b8
SHA-256: eb1f8a08c5e6508f437a18e39d6d7b48f8747f0d7351dae8629c5aa22f87feb6
Size: 8.07 MB
Asianux Server 8 for x86_64
- bind-9.11.20-5.el8.1.x86_64.rpm
MD5: dd24ce351bb9b039dbdd3e1924121a4e
SHA-256: 515f9ad21e17e9c77f402bcb8e0b59e728a4f8ca7332bf13e7335cee5cc123c8
Size: 2.09 MB - bind-chroot-9.11.20-5.el8.1.x86_64.rpm
MD5: 158bdda78e15e2829f16daee29976b31
SHA-256: 7ee9429c2cc8f9578a5e6589ea0139bd9f4fa853c74e2f3fe2dfffdff2af2e1f
Size: 102.17 kB - bind-devel-9.11.20-5.el8.1.x86_64.rpm
MD5: 44a198429a33fac15e192f9e8ee927d7
SHA-256: 6dad8bb1c0c5657cbe924df6fa508877795f46d64da3b4bdc44851d14db48325
Size: 175.18 kB - bind-export-devel-9.11.20-5.el8.1.x86_64.rpm
MD5: 1f678aa4b79bf0411c7c906818b07966
SHA-256: a156cf867a854cd26ceb32b7ba29a25c55fac8783eabba010e5662116b8349c2
Size: 403.67 kB - bind-export-libs-9.11.20-5.el8.1.x86_64.rpm
MD5: c2a9f5e49cb6fdf6105d360f9e88dc2a
SHA-256: 7e68c271e99cb69fca90d54634c0e49bffc42cea9893b7577e28a53d69cc3963
Size: 1.13 MB - bind-libs-9.11.20-5.el8.1.x86_64.rpm
MD5: 712d453a0e9d51283a89e76ee3e80e83
SHA-256: 035029d76ab06ec87b853827b1a8a7b9522b881da7010baee23f2b202466412f
Size: 171.35 kB - bind-libs-lite-9.11.20-5.el8.1.x86_64.rpm
MD5: 28b98678da9a0f885bc73bb5bc0a09ce
SHA-256: 3039783a5fa7cffe9ab2458b592336114c9fccb3b01fb42e1e0b90a9bcfa98b5
Size: 1.17 MB - bind-license-9.11.20-5.el8.1.noarch.rpm
MD5: 72c580778a1cafe630c8aecf81ef2c03
SHA-256: 7c9e7fbffcc5e42cc7da0425a3fea66686e5528fa3dd48065f0872e5bae36ca0
Size: 100.44 kB - bind-lite-devel-9.11.20-5.el8.1.x86_64.rpm
MD5: 82e11bdf912a95aee23a0839f506ff24
SHA-256: 65b22e6ffde2240e4354bc4c7ee8492d70ecc15ef79768e77b01c52e0898baec
Size: 396.78 kB - bind-pkcs11-9.11.20-5.el8.1.x86_64.rpm
MD5: 16c58e0456539dc45e1ab3f917df896f
SHA-256: 02828d37765d40978143b14c9cecc9c42ee2f3ebdfcd472a2e680d08945df367
Size: 388.98 kB - bind-pkcs11-devel-9.11.20-5.el8.1.x86_64.rpm
MD5: 1ba709734a3390893f59cf2f05016d9b
SHA-256: 2968b764e5dc09202599ebc110346d4fe370d972fed69c9e4795dcb05f1898d6
Size: 112.64 kB - bind-pkcs11-libs-9.11.20-5.el8.1.x86_64.rpm
MD5: f1cd690fa31952faafffb3c5880a54d1
SHA-256: c9f3a70891ef71ff722fe9d64a0c6a7b43837329addc2e9f66d65ad339240eed
Size: 1.11 MB - bind-pkcs11-utils-9.11.20-5.el8.1.x86_64.rpm
MD5: 0f058965bf691189be313213dec27e96
SHA-256: 1fa0f47c42603d8ed38bd15805ede4c5206a085de1b80cb4e3114020cee3700e
Size: 257.84 kB - bind-sdb-9.11.20-5.el8.1.x86_64.rpm
MD5: f101dc4222311e9f20e939c9670f8ddf
SHA-256: fc16823b9ee0ebcee5ca199db0f7a8afaa384547bcbfc8a42a9a8c1238a93d57
Size: 449.22 kB - bind-sdb-chroot-9.11.20-5.el8.1.x86_64.rpm
MD5: d702a31ab837b616d902f3e49c23b5e1
SHA-256: cf484a9e182ae4d0375030be1dcc874e850de66d9d190551e671002dfab4b8c2
Size: 102.17 kB - bind-utils-9.11.20-5.el8.1.x86_64.rpm
MD5: 9fea866b7e51186da3413d7d614663d9
SHA-256: a4d1660c66404ff337843178cba8417b0000b7dc43c0f06234e2ae9f6fd033be
Size: 443.37 kB - python3-bind-9.11.20-5.el8.1.noarch.rpm
MD5: 82704d89c61322756a637d7382e81cf9
SHA-256: ee374a0dfa2f8c20deb724f2c47857fe4a140f2fbe0cd8639dc50e2886c4bf80
Size: 147.71 kB