bind-9.8.2-0.68.8.0.3.rc1.AXS4
エラータID: AXSA:2021-1549:05
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name
System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for
verifying that the DNS server is operating correctly.
Security Fix(es):
*bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security
policy negotiation (CVE-2020-8625)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE-2020-8625
BIND servers are vulnerable if they are running an affected version and are
configured to use GSS-TSIG features. In a configuration which uses BIND's
default settings the vulnerable code path is not exposed, but a server can be
rendered vulnerable by explicitly setting valid values for the
tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the
default configuration is not vulnerable, GSS-TSIG is frequently used in networks
where BIND is integrated with Samba, as well as in mixed-server environments
that combine BIND servers with Active Directory domain controllers. The most
likely outcome of a successful exploitation of the vulnerability is a crash of
the named process. However, remote code execution, while unproven, is
theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and
versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND
Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND
9.17 development branch
Update packages.
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch
N/A
SRPMS
- bind-9.8.2-0.68.8.0.3.rc1.AXS4.src.rpm
MD5: e6fe96e360462429cf860f3060d6f4aa
SHA-256: 6d298e9eb9243994adeac23d55f1208b03f22b3093936625bc54a2c65088aba3
Size: 8.49 MB
Asianux Server 4 for x86
- bind-9.8.2-0.68.8.0.3.rc1.AXS4.i686.rpm
MD5: 9e239edf3314bb8d4ed2f5d50036c78c
SHA-256: 56c6492659c99b47f3c5ac2b84259ff1e2e4e9b2765e7f8964cd3be48f40cab6
Size: 4.00 MB - bind-chroot-9.8.2-0.68.8.0.3.rc1.AXS4.i686.rpm
MD5: 67cda6ce6c347735ff79d5aa11ebf5ea
SHA-256: 865c5493193e7a77dd374d54a1cae096f8995679a3826ea325481118176250e3
Size: 78.39 kB - bind-libs-9.8.2-0.68.8.0.3.rc1.AXS4.i686.rpm
MD5: ec739bcd27822ed54dcacbfc8c381145
SHA-256: 29fae500354e23794de84dc9f27dbf920126a1a56b47cc572bedeac723bcd1b4
Size: 904.40 kB - bind-utils-9.8.2-0.68.8.0.3.rc1.AXS4.i686.rpm
MD5: 213e01f871276554818e25d8e42ed904
SHA-256: f8045b2c04d782ea65b7e19761a851ba17364e9e95a757eea7ce39a0a7eb6f47
Size: 188.73 kB
Asianux Server 4 for x86_64
- bind-9.8.2-0.68.8.0.3.rc1.AXS4.x86_64.rpm
MD5: 056656018d70d0678b3438feb88a1bd2
SHA-256: 1b15fdeb95e7f5cf16111f116ff8743853cbc96525c1cdea48e94d616965baf7
Size: 4.00 MB - bind-chroot-9.8.2-0.68.8.0.3.rc1.AXS4.x86_64.rpm
MD5: 8062dda927adea25ecd79e9fda2a7dde
SHA-256: ac367894a2b9f34cae5ea0ec1388b8722a198c2a2c144f14281d681dd1b41ccd
Size: 77.95 kB - bind-libs-9.8.2-0.68.8.0.3.rc1.AXS4.x86_64.rpm
MD5: f7bdab2051ec7f9eabe9172187ff8382
SHA-256: 7deae4037ba8a8134f2bfc470bb63103441635da8fab5b3492242cedbe7dfe40
Size: 892.54 kB - bind-utils-9.8.2-0.68.8.0.3.rc1.AXS4.x86_64.rpm
MD5: 8a66399cb5f96419f5d45ca2a86cb2ab
SHA-256: 7c7b78cb47ac005f7c6f4a2ff350b9c81184c3dbecdf8b84349e256b34fd7a9a
Size: 189.33 kB - bind-libs-9.8.2-0.68.8.0.3.rc1.AXS4.i686.rpm
MD5: ec739bcd27822ed54dcacbfc8c381145
SHA-256: 29fae500354e23794de84dc9f27dbf920126a1a56b47cc572bedeac723bcd1b4
Size: 904.40 kB