Amazon Linux 1 Security Advisory: ALAS-2015-594
Advisory Release Date: 2015-09-02 12:00 Pacific
Advisory Updated Date: 2015-09-02 13:05 Pacific
As discussed upstream (https://kb.isc.org/article/AA-01287/0), parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key. (CVE-2015-5722)
Also disclosed upstream (https://kb.isc.org/article/AA-01291/0) today was CVE-2015-5986 which does not impact the version of bind in the Amazon Linux AMI.
Affected Packages:
bind
Issue Correction:
Run yum update bind to update your system.
i686:
bind-9.8.2-0.30.rc1.39.amzn1.i686
bind-libs-9.8.2-0.30.rc1.39.amzn1.i686
bind-sdb-9.8.2-0.30.rc1.39.amzn1.i686
bind-devel-9.8.2-0.30.rc1.39.amzn1.i686
bind-debuginfo-9.8.2-0.30.rc1.39.amzn1.i686
bind-chroot-9.8.2-0.30.rc1.39.amzn1.i686
bind-utils-9.8.2-0.30.rc1.39.amzn1.i686
src:
bind-9.8.2-0.30.rc1.39.amzn1.src
x86_64:
bind-sdb-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-chroot-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-debuginfo-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-devel-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-utils-9.8.2-0.30.rc1.39.amzn1.x86_64
bind-libs-9.8.2-0.30.rc1.39.amzn1.x86_64