U radu programskog paketa unbound uočeni su novi sigurnosni propusti koje udaljeni napadač može iskoristiti za napad uskraćivanjem usluga (DoS).
Paket:
unbound 1.x
Operacijski sustavi:
Fedora 15, Fedora 16
Kritičnost:
7.8
Problem:
neodgovarajuće rukovanje memorijom, pogreška u programskoj komponenti
Iskorištavanje:
udaljeno
Posljedica:
uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-4528, CVE-2011-4869, CVE-2011-1922
Izvorni ID preporuke:
FEDORA-2011-17282
Izvor:
Fedora
Problem:
Sigurnosne ranjivosti su posljedica pogrešnog rukovanja memorijom te pogrešne implementacije programskih komponenti "validator/val_nsec3.c" i "daemon/worker.c".
Posljedica:
Udaljeni napadač navedene propuste može iskoristiti za DoS (eng. Denial of Service) napad.
Rješenje:
Svim se korisnicima savjetuje korištenje dostupnih zakrpa.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-17282
2011-12-22 21:43:57
--------------------------------------------------------------------------------
Name : unbound
Product : Fedora 16
Version : 1.4.14
Release : 1.fc16
URL : http://www.nlnetlabs.nl/unbound/
Summary : Validating, recursive, and caching DNS(SEC) resolver
Description :
Unbound is a validating, recursive, and caching DNS(SEC) resolver.
The C implementation of Unbound is developed and maintained by NLnet
Labs. It is based on ideas and algorithms taken from a java prototype
developed by Verisign labs, Nominet, Kirei and ep.net.
Unbound is designed as a set of modular components, so that also
DNSSEC (secure DNS) validation and stub-resolvers (that do not run
as a server, but are linked into an application) are easily possible.
--------------------------------------------------------------------------------
Update Information:
Security update for CVE-2011-4528 / VU#209659
--------------------------------------------------------------------------------
ChangeLog:
* Mon Dec 19 2011 Paul Wouters <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.14-1
- Upgraded to 1.4.14 for CVE-2011-4528 / VU#209659
- SSL-wrapped query support for dnssec-trigger
- EDNS handling changes
- Removed integrated EDNS patches
- Disabled use-caps-for-id, GoDaddy domains now break on it
- Enabled new harden-below-nxdomain
- Enable ipv6 per default (was disabled for broken kernels)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #769068 - CVE-2011-4528 CVE-2011-4869 unbound 1.4.13 DNS Server
multiple crashes
https://bugzilla.redhat.com/show_bug.cgi?id=769068
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update unbound' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-17337
2011-12-22 21:46:14
--------------------------------------------------------------------------------
Name : unbound
Product : Fedora 15
Version : 1.4.14
Release : 1.fc15
URL : http://www.nlnetlabs.nl/unbound/
Summary : Validating, recursive, and caching DNS(SEC) resolver
Description :
Unbound is a validating, recursive, and caching DNS(SEC) resolver.
The C implementation of Unbound is developed and maintained by NLnet
Labs. It is based on ideas and algorithms taken from a java prototype
developed by Verisign labs, Nominet, Kirei and ep.net.
Unbound is designed as a set of modular components, so that also
DNSSEC (secure DNS) validation and stub-resolvers (that do not run
as a server, but are linked into an application) are easily possible.
--------------------------------------------------------------------------------
Update Information:
Security update for CVE-2011-4528 / VU#209659
--------------------------------------------------------------------------------
ChangeLog:
* Mon Dec 19 2011 Paul Wouters <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.14-1
- Upgraded to 1.4.14 for CVE-2011-4528 / VU#209659
- SSL-wrapped query support for dnssec-trigger
- EDNS handling changes
- Removed integrated EDNS patches
- Disabled use-caps-for-id, GoDaddy domains now break on it
- Enabled new harden-below-nxdomain
- Enable ipv6 per default (was disabled for broken kernels)
* Wed Sep 21 2011 Paul Wouters <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.13-1
- Upgraded to 1.4.13
- Removed merged in pythonmod patch
- Added EDNS1480 patch to fix unbound on broken EDNS/UDP networks
- Updated unbound.conf with commented out new option tcp-upstream:
* Mon Aug 8 2011 Paul Wouters <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.12-1
- Updated to 1.4.12
- Updated stock unbound.conf for new options introduced
- Added pythonmod docs and examples
- Added ghost for /var/run/unbound (bz#656710)
- Fix for python module load in the server (Tom Hendrikx)
- No longer enable --enable-debug as it causes degraded performance
under load.
* Wed May 25 2011 Paul Wouters <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.8-5
- Applied patch for CVE-2011-1922 DoS vulnerability
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #769068 - CVE-2011-4528 CVE-2011-4869 unbound 1.4.13 DNS Server
multiple crashes
https://bugzilla.redhat.com/show_bug.cgi?id=769068
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update unbound' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke