Summary: | <net-dns/bind-9.11.1_p1: Multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | ago, idl0r, idl0r |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2017/06/14/4 | ||
Whiteboard: | B3 [glsa cve] | ||
Package list: |
net-dns/bind-9.11.1_p1
net-dns/bind-tools-9.11.1_p1
|
Runtime testing required: | --- |
Bug Depends on: | |||
Bug Blocks: | 615420 |
Description
Kristian Fiskerstrand (RETIRED)
2017-06-14 10:37:35 UTC
Public via http://www.openwall.com/lists/oss-security/2017/06/14/4 Date: Wed, 14 Jun 2017 18:31:00 -0500 From: ISC Security Officer <security-officer@....org> To: oss-security@...ts.openwall.com Cc: ISC Security Officer <security-officer@....org> Subject: BIND9 CVE-2017-3140 & CVE-2017-3141 Today ISC announced CVE-2017-3140, CVE-2017-3141, and an operational notification regarding LMDB in BIND 9.11 CVE-2017-3140 is a denial-of-service vulnerability affecting 9.9.10, 9.10.5, 9.11.0->9.11.1, 9.9.10-S1, and 9.10.5-S1 when configured with Response Policy Zones (RPZ) utilizing NSIP or NSDNAME rules. We are aware that some subscribers to this list maintain BIND packages which have diverged from the official ISC code branches. While we cannot always offer specific guidance, in the case of CVE-2017-3140 maintainers who have selectively backported BIND changes are advised to check whether they have included change #4377, as that change has been determined to be a cause of CVE-2017-3140. CVE-2017-3141 is a Windows privilege escalation vector affecting 9.2.6-P2+, 9.3.2-P1+, 9.4.x, 9.5.x, 9.6.x, 9.7.x, 9.8.x, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, and 9.10.5-S1. The BIND Windows installer failed to properly quote the service paths, possibly allowing a local user to achieve privilege escalation, if allowed by file system permissions. BIND 9.11.0 and 9.11.1 carries a number of integration problems with LMDB (liblmdb) that will be addressed in BIND 9.11.2, planned for release in July/August 2017. Our full CVE text can be found at: https://kb.isc.org/article/AA-01495/74/CVE-2017-3140 https://kb.isc.org/article/AA-01496/74/CVE-2017-3141 The full operational notification can be found at: https://kb.isc.org/article/AA-01497/169/LMDB-integration-problems.html New releases of BIND, including security fixes for these vulnerabilities, are available at: http://www.isc.org/downloads/ Release notes can be obtained using the following links: ftp://ftp.isc.org/isc/bind9/9.9.10-P1/ ftp://ftp.isc.org/isc/bind9/9.10.5-P1/ ftp://ftp.isc.org/isc/bind9/9.11.1-P1/ Brian Conry Security Officer bind and bind-tools 9.11.1_p1 have just been added. (In reply to Christian Ruppert (idl0r) from comment #2) > bind and bind-tools 9.11.1_p1 have just been added. Thank you for the bump, please call for stabilization when you feel it is ready *** Bug 622310 has been marked as a duplicate of this bug. *** (In reply to Kristian Fiskerstrand from comment #3) > (In reply to Christian Ruppert (idl0r) from comment #2) > > bind and bind-tools 9.11.1_p1 have just been added. > > Thank you for the bump, please call for stabilization when you feel it is > ready Is this ready for stabilization yet? (In reply to Kristian Fiskerstrand from comment #5) > (In reply to Kristian Fiskerstrand from comment #3) > > (In reply to Christian Ruppert (idl0r) from comment #2) > > > bind and bind-tools 9.11.1_p1 have just been added. > > > > Thank you for the bump, please call for stabilization when you feel it is > > ready > > Is this ready for stabilization yet? Yeah, looks ok to me. If you want to stabilize it, please stabilize bind-tools-9.11.1_p1 as well. amd64 stable The stabilisation of bind-9.11.1_p1 effectively re-opens bug 600212. Stable on alpha. Added to an existing GLSA. ia64 stable x86 stable arm stable sparc stable ppc stable ppc64 stable Arches or maintainers please stabilize for Hippo ASAP. Security will release GLSA for this in 7 days with or without hppa arch being stable. (In reply to Yury German from comment #17) > Arches or maintainers please stabilize for Hippo <-- hppa Script went crazy. This issue was resolved and addressed in GLSA 201708-01 at https://security.gentoo.org/glsa/201708-01 by GLSA coordinator Yury German (BlueKnight). re-opening for cleanup. Maintainer(s), please drop the vulnerable version(s). hppa stable Last arch is done here. Tree is clean from vulnerable versions. Gentoo Security Padawan ChrisADR |