Amazon Linux 1 Security Advisory: ALAS-2015-573
Advisory Release Date: 2015-07-28 11:32 Pacific
Advisory Updated Date: 2015-07-28 11:32 Pacific
As reported upstream (https://kb.isc.org/article/AA-01272/0), an error in the handling of TKEY queries can be exploited by an attacker for use as a denial-of-service vector, as a constructed packet can use the defect to trigger a REQUIRE assertion failure, causing BIND to exit.
Affected Packages:
bind
Issue Correction:
Run yum update bind to update your system.
i686:
bind-libs-9.8.2-0.30.rc1.38.amzn1.i686
bind-chroot-9.8.2-0.30.rc1.38.amzn1.i686
bind-sdb-9.8.2-0.30.rc1.38.amzn1.i686
bind-utils-9.8.2-0.30.rc1.38.amzn1.i686
bind-devel-9.8.2-0.30.rc1.38.amzn1.i686
bind-9.8.2-0.30.rc1.38.amzn1.i686
bind-debuginfo-9.8.2-0.30.rc1.38.amzn1.i686
src:
bind-9.8.2-0.30.rc1.38.amzn1.src
x86_64:
bind-sdb-9.8.2-0.30.rc1.38.amzn1.x86_64
bind-chroot-9.8.2-0.30.rc1.38.amzn1.x86_64
bind-libs-9.8.2-0.30.rc1.38.amzn1.x86_64
bind-utils-9.8.2-0.30.rc1.38.amzn1.x86_64
bind-9.8.2-0.30.rc1.38.amzn1.x86_64
bind-debuginfo-9.8.2-0.30.rc1.38.amzn1.x86_64
bind-devel-9.8.2-0.30.rc1.38.amzn1.x86_64