bind-9.8.2-0.10.rc1.AXS4
エラータID: AXSA:2012-801:02
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Security issues fixed with this release:
• CVE-2012-1033
The resolver in ISC BIND 9 through 9.8.1-P1 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
• CVE-2012-1667
ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive
Fixed bugs:
• nslookup does not fail anymore when /etc/resolv.conf contains nameservers with disabled recursion.
• Improved the handling of errors arising on automatic update of DNSSEC trust anchors: the named daemon now exits gracefully.
• Disabled the atomic options on PowerPC to make the multi-threaded named daemon more reliable.
• Fixed a race condition happening on validation of DNSSEC-signed NXDOMAIN responses.
• When the named server was configured as a master server, it could sometimes fail to compress an incompressible zone with the following error message: "transfer of './IN': sending zone data: ran out of space". This has been fixed.
• Named no longer crashes during a DNS zone transfer.
• If it does not exist, the rndc.key file is now generated by the named initscript during the service startup, instead of by the rndc-confgen -a command during installation.
• After running the rndc reload command, named failed to update DNSSEC trust anchors and logged the message:"managed-keys-zone ./IN: Failed to create fetch for DNSKEY update". This has been fixed.
• Fixed the bind spec file error responsible for not bind-chroot not creating a /dev/null device and leaving some empty directories after uninstalling.
• Because the dynamic-db plug-ins were loaded too early, it could cause the configuration in the named.conf file to override the configuration supplied by the plug-in, and named could fail to start. This has been fixed.
• Previously, when stopping the named service, the /var/named directory was always unmounted, regardless of chroot configuration. Now it is unmounted only when the chroot configuration is enabled.
• It was previously impossible to determine whether an nslookup run was successful from the error code as it failed to return a non-zero exit code when it failed to get an answer. This has been fixed; the exit code is "1".
Enhancements
• Added fixed ordering support for the rrset-order option: resource records can now be ordered in the order they are loaded from the zone file.
• Lowered the severity of the messages relating to external DNS queries from "notice" to "debug" to not flood the log with too much unnecessary information.
• In order to avoid conflicts with other services, the named daemon now uses portreserve to reserve the Remote Name Daemon.
Update packages.
The resolver in ISC BIND 9 through 9.8.1-P1 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
N/A
SRPMS
- bind-9.8.2-0.10.rc1.AXS4.src.rpm
MD5: 4c5d9440ea63908939c204fe4ddaac79
SHA-256: 4eaada3cd76d699bb2e88ae332bebf0d8b04f4fd1d5c490032e14943451f7d58
Size: 8.33 MB
Asianux Server 4 for x86
- bind-9.8.2-0.10.rc1.AXS4.i686.rpm
MD5: 70edbea79d2dcc6a8964fa211cf543c2
SHA-256: 0a1cbd2683f03fe0b336429f1e44a1d9c34940435059fc2dbf81a06e18dfdd75
Size: 3.97 MB - bind-chroot-9.8.2-0.10.rc1.AXS4.i686.rpm
MD5: f5afbac7e4e1f982f3e4e56c6c0ad2cc
SHA-256: 81a7e06a563b127e270cc4e02428ee28f9e96cd74a8a95117daedd33fc102ac6
Size: 69.18 kB - bind-libs-9.8.2-0.10.rc1.AXS4.i686.rpm
MD5: 5f84cf6278d23ee4f14ffcc315e105b8
SHA-256: f053bed37e6184e2d72414e7981e82247f073c0e693e5335ccfc5705b6cc7c2a
Size: 881.02 kB - bind-utils-9.8.2-0.10.rc1.AXS4.i686.rpm
MD5: 8e3c830c6ffb7c3d65c124dbcc39444a
SHA-256: a6261e01790fc6c232b8bf043c750c4e9ae333e21ed194d683f58b82f075ab4c
Size: 179.11 kB
Asianux Server 4 for x86_64
- bind-9.8.2-0.10.rc1.AXS4.x86_64.rpm
MD5: 53178076cc727aa7a84f56eb5d55d26a
SHA-256: 2320b676035a9700409627efd6e88bfbfe32b7751899c673814df6183c560556
Size: 3.96 MB - bind-chroot-9.8.2-0.10.rc1.AXS4.x86_64.rpm
MD5: 9476fc7dc127c0715b88f6ea25eddbb2
SHA-256: 8e283fbbce2aeb130f81c70814c00d5bf7381b33f62f7f1dd231ae02477e6b87
Size: 68.74 kB - bind-libs-9.8.2-0.10.rc1.AXS4.x86_64.rpm
MD5: 4a4f2bf41a0b355df523c567f59e72e9
SHA-256: 3875cb568c31898d9c169b690f951684a8e51012cb69bf222e35da21ed38d190
Size: 869.76 kB - bind-utils-9.8.2-0.10.rc1.AXS4.x86_64.rpm
MD5: d9dc254eecbc91cd31b9f250c5bf43b4
SHA-256: 049f3be3fcc97cebf578e65f30d77acb90eb2abaf8bfa6b057113e4875d7d8ad
Size: 180.14 kB - bind-libs-9.8.2-0.10.rc1.AXS4.i686.rpm
MD5: 5f84cf6278d23ee4f14ffcc315e105b8
SHA-256: f053bed37e6184e2d72414e7981e82247f073c0e693e5335ccfc5705b6cc7c2a
Size: 881.02 kB