Sicherheit: Denial of Service in BIND
Aktuelle Meldungen Distributionen
Name: Denial of Service in BIND
ID: FEDORA-2014-16576
Distribution: Fedora
Plattformen: Fedora 19
Datum: Di, 6. Januar 2015, 09:44
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
Applikationen: BIND


Name        : bind
Product : Fedora 19
Version : 9.9.3
Release : 16.P2.fc19
URL : http://www.isc.org/products/BIND/
Summary : The Berkeley Internet Name Domain (BIND) DNS (Domain Name System)
Description :
BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols. BIND includes a DNS server (named),
which resolves host names to IP addresses; a resolver library
(routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating properly.

Update Information:

Fix for CVE-2014-8500

* Wed Dec 10 2014 Tomas Hozza <thozza@redhat.com> 32:9.9.3-16.P2
- Fix CVE-2014-8500 (#1171913)
* Wed Mar 5 2014 Tomas Hozza <thozza@redhat.tom> 32:9.9.3-15.P2
- dlz_dlopen driver could return the wrong error leading to a segfault
- Fix race condition when freeing fetch object (ISC-Bugs #35385)
* Tue Jan 14 2014 Tomas Hozza <thozza@redhat.com> 32:9.9.3-14.P2
- Fix CVE-2014-0591
* Thu Nov 28 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-13.P2
- Fixed memory leak in nsupdate if 'realm' was used multiple times
* Thu Oct 31 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-12.P2
- Correct the upstream patch for #794940
* Wed Oct 30 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-11.P2
- Use upstream version of patch for previously fixed #794940
- Create symlink /var/named/chroot/var/run -> /var/named/chroot/run
- Added session-keyfile statement into default named.conf since we use
* Fri Oct 18 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-10.P2
- Fix race condition on send buffers in dighost.c (#794940)
* Tue Oct 8 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-9.P2
- install isc/errno2result.h header
* Tue Sep 10 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-8.P2
- Fix [ISC-Bugs #34738] dns_journal_open() returns a pointer to stack
* Fri Aug 16 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-7.P2
- Don't generate rndc.key if there exists rndc.conf
* Fri Aug 16 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-6.P2
- don't install named-sdb.service if SDB macro is defined to zero
* Sun Jul 28 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-5.P2
- update to 9.9.3-P2 (fix for CVE-2013-4854)
- update RRL patch to 9.9.3-P2-rl.13207.22
* Thu Jul 18 2013 Tomas Hozza <thozza@redhat.com> 32:9.9.3-4.P1
- Fix script for setting up chroot so it unmounts everything successfully

[ 1 ] Bug #1171912 - CVE-2014-8500 bind: delegation handling denial of

This update can be installed with the "yum" update program. Use
su -c 'yum update bind' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten