You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa bind99

Sigurnosni nedostaci programskog paketa bind99

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2017-59127a606c
2017-07-27 14:24:45.247239
——————————————————————————–

Name : bind99
Product : Fedora 24
Version : 9.9.10
Release : 2.P3.fc24
URL : http://www.isc.org/products/BIND/
Summary : The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) libraries
Description :
BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols. This package set contains only export
version of BIND libraries, that are used for building ISC DHCP.

——————————————————————————–
Update Information:

Fixes CVE-2017-3142 and CVE-2017-3143
——————————————————————————–
References:

[ 1 ] Bug #1466610 – CVE-2017-3143 bind99: bind: An error in TSIG authentication can permit unauthorized dynamic updates [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1466610
[ 2 ] Bug #1466612 – CVE-2017-3142 bind99: bind: An error in TSIG authentication can permit unauthorized zone transfers [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1466612
[ 3 ] Bug #1471747 – ddns updates broken since rebuild with bind99 9.9.10
https://bugzilla.redhat.com/show_bug.cgi?id=1471747
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade bind99’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-07-0192-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa freeradius

Otkriveni su sigurnosni nedostaci u programskom paketu freeradius za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izvođenje napada...

Close