Bug 1193820 (CVE-2015-1349)

Summary: CVE-2015-1349 bind: issue in trust anchor management can cause named to crash
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: btotty, magoldma, mdshaikh, mjc, mkalyat, security-response-team, thozza, vchepkov, vkaigoro, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: BIND 9.9.7, BIND 9.10.2 Doc Type: Bug Fix
Doc Text:
A flaw was found in the way BIND handled trust anchor management. A remote attacker could use this flaw to cause the BIND daemon (named) to crash under certain conditions.
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-03-11 03:51:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1197618, 1197619, 1197620, 1197621    
Bug Blocks: 1193821    
Attachments:
Description Flags
bind9-patch-v9_10_1-CVE-2015-1349
none
bind9-patch-v9_9_6-CVE-2015-1349 none

Description Vasyl Kaigorodov 2015-02-18 10:31:54 UTC
It was reported that a problem with trust anchor management can cause named to crash, affecting BIND versions 9.7.0+.

ISC developers believe that it will be very difficult for this to be triggered in most cases, requiring DNSSEC validation amongst other factors.

ISC will not be producing patches specifically for BIND 9.8 or BIND 9.6-ESV, both of which are beyond their End of Life (EOL) and are no longer supported by ISC.

Patches that correct this issue for ISC BIND 9.10.1 and ISC BIND 9.9.6 are attached to this Bugzilla.

Comment 1 Vasyl Kaigorodov 2015-02-18 10:32:54 UTC
Created attachment 993044 [details]
bind9-patch-v9_10_1-CVE-2015-1349

Comment 2 Vasyl Kaigorodov 2015-02-18 10:33:11 UTC
Created attachment 993045 [details]
bind9-patch-v9_9_6-CVE-2015-1349

Comment 3 Vasyl Kaigorodov 2015-02-18 10:36:08 UTC
Acknowledgements:

Red Hat would like to thank ISC for reporting this issue.

Comment 4 Vasyl Kaigorodov 2015-02-20 13:16:58 UTC
Looking at bind9-patch-v9_9_6-CVE-2015-1349, and at RHEL code, it appear that RHEL 5 (bind-9.3.6-P1) is not affected by this (does not contain affected code), and both RHEL-6 (bind-9.8.2rc1) and RHEL-7 (bind-9.9.4) are affected by this issue.

Comment 5 Vasyl Kaigorodov 2015-02-20 13:43:57 UTC
There is also bind97 component in RHEL-5 which, according to upstream, is also affected.

Comment 7 Tomáš Hozza 2015-02-24 08:27:47 UTC
setting NEEDINFO due to comment #6

Comment 12 Fedora Update System 2015-03-05 12:38:42 UTC
bind-9.9.6-8.P1.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 13 Fedora Update System 2015-03-05 12:38:48 UTC
bind-9.9.4-18.P2.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 16 errata-xmlrpc 2015-03-11 01:58:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2015:0672 https://rhn.redhat.com/errata/RHSA-2015-0672.html

Comment 19 Fabio Olive Leite 2015-03-26 20:00:26 UTC
Statement:

Red Hat Enterprise Linux 5 ships with both bind (9.3) packages which are not affected by this issue, and bind97 packages, which are affected by this issue.
Red Hat Enterprise Linux 5 is now in Production Phase 3 of the support and maintenance life cycle. This issue is not currently planned to be addressed in future bind97 updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.