Bug 1357803 (CVE-2016-2775)
Summary: | CVE-2016-2775 bind: Too long query name causes segmentation fault in lwresd | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | jpopelka, mruprich, msehnout, pandrade, pemensik, slawomir, thozza, vonsch, yozone, zdohnal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | bind 9.9.9-P2, bind 9.10.4-P2, bind 9.11.0b2, bind 9.9.9-S3 | Doc Type: | If docs needed, set a value |
Doc Text: |
It was found that the lightweight resolver protocol implementation in BIND could enter an infinite recursion and crash when asked to resolve a query name which, when combined with a search list entry, exceeds the maximum allowable length. A remote attacker could use this flaw to crash lwresd or named when using the "lwres" statement in named.conf.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-07-12 13:04:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1306504, 1349329, 1349331, 1357804, 1357805, 1482441, 1482442 | ||
Bug Blocks: | 1357806 |
Description
Adam Mariš
2016-07-19 08:24:10 UTC
Created bind tracking bugs for this issue: Affects: fedora-all [bug 1357804] Created bind99 tracking bugs for this issue: Affects: fedora-all [bug 1357805] bind99-9.9.9-1.P2.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report. bind-9.10.4-1.P2.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report. bind99-9.9.9-1.P2.fc23, dhcp-4.3.3-10.P1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. bind-9.10.4-1.P2.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. This flaw in BIND was fixed for RHEL 6.9 in RHBA-2017:0651. https://access.redhat.com/errata/RHBA-2017:0651 Upstream commit: https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=38cc2d14e218e536e0102fa70deef99461354232 The following are related documentation-only updates: https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=429701008e672edc50d33c83d983ba096fee5f13 https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=909d442cc0bed4337760419fa135c98224a79c73 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Extended Update Support Red Hat Enterprise Linux 7.2 Extended Update Support Via RHSA-2017:2533 https://access.redhat.com/errata/RHSA-2017:2533 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2016-2775 |