Security update for bind

SUSE Security Update: Security update for bind
Announcement ID: SUSE-SU-2015:0480-1
Rating: important
References: #743758 #858639 #908994
Affected Products:
  • SUSE Linux Enterprise Server 11 SP1 LTSS

  • An update that solves two vulnerabilities and has one errata is now available. It includes one version update.

    Description:


    This bind updated fixes the following two security issues:

    *

    A flaw in delegation handling could be exploited to put named into
    an infinite loop. This has been addressed by placing limits on the number
    of levels of recursion named will allow (default 7), and the number of
    iterative queries that it will send (default 50) before terminating a
    recursive query (CVE-2014-8500, bnc#908994). The recursion depth limit is
    configured via the "max-recursion-depth"
    option, and the query limit via the "max-recursion-queries" option.

    *

    A flaw when handling malformed NSEC3-signed zones could lead named
    to a crash. (CVE-2014-0591, bnc#858639)

    Additionally, a non-security bug has been fixed:

    * Fix handling of TXT records in ldapdump (bnc#743758).

    Security Issues:

    * CVE-2014-8500

    * CVE-2014-0591

    Indications:

    Everybody should update.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11 SP1 LTSS:
      zypper in -t patch slessp1-bind=10200

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 9.6ESVR11W1]:
      • bind-9.6ESVR11W1-0.2.1
      • bind-chrootenv-9.6ESVR11W1-0.2.1
      • bind-doc-9.6ESVR11W1-0.2.1
      • bind-libs-9.6ESVR11W1-0.2.1
      • bind-utils-9.6ESVR11W1-0.2.1
    • SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64) [New Version: 9.6ESVR11W1]:
      • bind-libs-32bit-9.6ESVR11W1-0.2.1

    References:

    • http://support.novell.com/security/cve/CVE-2014-0591.html
    • http://support.novell.com/security/cve/CVE-2014-8500.html
    • https://bugzilla.suse.com/743758
    • https://bugzilla.suse.com/858639
    • https://bugzilla.suse.com/908994
    • http://download.suse.com/patch/finder/?keywords=b8f4d960338b2e26cbb436ddc301333c