Summary: | <net-dns/bind-9.4.3_p5 Cache poisoning (CVE-2009-4022,CVE-2010-0097) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Rajiv Aaron Manglani (RETIRED) <rajiv> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | barzog, bind+disabled, hanno, jer |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 308035 | ||
Bug Blocks: |
Description
Rajiv Aaron Manglani (RETIRED)
![]() Changes since 9.4.3-P4: 2831. [security] Do not attempt to validate or cache out-of-bailiwick data returned with a secure answer; it must be re-fetched from its original source and validated in that context. [RT #20819] 2828. [security] Cached CNAME or DNAME RR could be returned to clients without DNSSEC validation. [RT #20737] 2827. [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712] bind-9.4.3_p5 and bind-9.6.1_p3 are in tree now. Bind herd, is this ready for stabilization? CVE-2010-0097 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0097): ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not properly validate DNSSEC (1) NSEC and (2) NSEC3 records, which allows remote attackers to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain. bind herd, ping, please see comment #3. (In reply to comment #3) > Bind herd, is this ready for stabilization? > sure, let's go ... Arches, please test and mark stable: =net-dns/bind-9.6.1_p3 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" Uh, scratch that, wrong version. This is correct: Arches, please test and mark stable: =net-dns/bind-9.4.3_p5 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" =net-dns/bind-9.4.3_p5 is now stable on x86 Stable for HPPA. ppc64 done alpha/arm/ia64/s390/sh/sparc, and i also took the liberty to do bind-tools. Ready to vote, I vote YES. Uh, we also need to wait for 308035 (CVE-2010-0290) as it seems, this fix was incomplete.. amd64 stable ppc done; closing as last arch GLSA vote positive and no announcement sent yet, reopening. Thanks everyone, GLSA request filed. GLSA 201006-11 |