bind-9.3.4-10.P1.1AXS3
エラータID: AXSA:2009-94:02
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Fixed bugs:
CVE-2007-6283
Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable permissions, which allows local users to perform unauthorized named commands, such as causing a denial of service by stopping named.
CVE-2008-0122
Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.
CVE-2008-1447
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
Other bugs:
- Accepts krb5-self and krb5-subdomain update-policy matches
- Added configtest to usage report from named initscript
- Added GSS-TSIG support to named
- Added GSS-TSIG support to nsupdate
- bind-chroot update now honours user defined chroot directory
- bind-sdb scripplet sets /etc/openldap/slapd.conf ownership correcly
- Checks DSA_do_verify returns value correctly
- Does not call restorecon on chroot/proc
- Does not crash when some subdomain are used as a rndc reload argument
- Fixed building of SDB stuff
- Fixed ${chroot}/dev/random SELinux labelling
- Fixed named.log sync in bind-chroot-admin
- Fixed a race condition during DBUS initialization
- Fixed rndc stop return value handler
- Fixed wrong perms of named's ldap schema
- initscript LSD standardization
- Minor changes in initscript
- Removed query-source{,-v6} option from caching-nameserver.conf
- Now return a nonzero value from initscript when named fails to reload
- Revised the permissions of executables and scripts
- Set the open files limit to unlimited by default as described in documentation
- Supressed errors from chroot's specfile scripts
- Updated L.ROOT-SERVERS.NET address in lib/dns/rootns.c file
- Updated named.root zone to affect root IPv6 migration
Update packages.
Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable permissions, which allows local users to perform unauthorized named commands, such as causing a denial of service by stopping named.
Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
From Asianux Server 3 SP2 updated packages.
SRPMS
- bind-9.3.4-10.P1.1AXS3.src.rpm
MD5: 4a6236e6dddbb8bd33f3fc9237883905
SHA-256: d6e61c356aafecd251ce4db69a7f34a94667e804acc9ab847333469b5a0789ed
Size: 5.28 MB
Asianux Server 3 for x86
- bind-9.3.4-10.P1.1AXS3.i386.rpm
MD5: e44adb5d91c09014c1a9b7d8b6aef673
SHA-256: 300697a7a2e4744adccf45a300ed2db225ec66d06f50d0ef4c51db4077beed96
Size: 956.06 kB - bind-chroot-9.3.4-10.P1.1AXS3.i386.rpm
MD5: 1c93d0c477ef3af29ab0c58f0396218d
SHA-256: a52240d1397f1e6fbba9411fdde43c4118a34b2966dccc3ae557af9dcc808aae
Size: 42.97 kB - bind-devel-9.3.4-10.P1.1AXS3.i386.rpm
MD5: 20c98397e82b4e19ab6482147d0affdc
SHA-256: fd91654efd9414ef9a165c0b42e8cf1f38383a14cde6c2cc6964236ff3b6117f
Size: 2.55 MB - bind-libs-9.3.4-10.P1.1AXS3.i386.rpm
MD5: 8314abd82a2554aa2d481eafc2c6bfdd
SHA-256: cf3fab91eedeb4d9b6327af0ab8deb45f68556e486dc067ff218fd87d97990c2
Size: 836.14 kB - bind-utils-9.3.4-10.P1.1AXS3.i386.rpm
MD5: 10e0de1a70765d62195cec50ab714825
SHA-256: 1e18820025a534820832a67856764352534583ea577f27b66db1510cbf8d2cb3
Size: 167.70 kB - caching-nameserver-9.3.4-10.P1.1AXS3.i386.rpm
MD5: 169a9d0a7d9b80a852592f5da1a2f697
SHA-256: c3afc09a2fa13b06c7e9ab8c8a9881e557d6f87a44d5bf1e8a9be1c7f6ab3245
Size: 59.27 kB
Asianux Server 3 for x86_64
- bind-9.3.4-10.P1.1AXS3.x86_64.rpm
MD5: 47fd9da5d8cf095f25ad532a9798d8ce
SHA-256: 545c08575d117926bad7cf647c634bbf335ae515920d77966973066d602db7ed
Size: 963.82 kB - bind-chroot-9.3.4-10.P1.1AXS3.x86_64.rpm
MD5: a526162dfb735a9d6c26ebfa8589c286
SHA-256: 8041ea6df013f10ad0332bbbb78f64e497bd8a47a252779a8a8c45c17f56a5f4
Size: 42.94 kB - bind-devel-9.3.4-10.P1.1AXS3.x86_64.rpm
MD5: ab47c76ff117544885b65cd048d0a14c
SHA-256: d6a8614aeb880498cbbff733f0dd52f361b19b63a77e660d4ed38d8d9e080e7e
Size: 2.58 MB - bind-libs-9.3.4-10.P1.1AXS3.x86_64.rpm
MD5: 47b49930d28e078f7d7740aa7e1efe6a
SHA-256: 345340e1d9a483c6b53b1ae6feda382361c2f42357242358827dd3ec33e8d1f7
Size: 869.08 kB - bind-utils-9.3.4-10.P1.1AXS3.x86_64.rpm
MD5: 0c37cdcfc189d2bca858b0de9cfaacc7
SHA-256: a1b6b61d536688dfeb4ae83fba91acf698d71e7731b38a1ee4401c90b00ee070
Size: 173.39 kB - caching-nameserver-9.3.4-10.P1.1AXS3.x86_64.rpm
MD5: 169c486e2ae563c54c44cc7df9df4746
SHA-256: 52c08898b6ce752c742d5f5d4c8e18d49e0fec21ef22dbf2e03b6b1170273f40
Size: 59.23 kB