ALAS-2015-594


Amazon Linux AMI Security Advisory: ALAS-2015-594
Advisory Release Date: 2015-09-02 13:05 Pacific
Severity: Critical
References: CVE-2015-5722 

Issue Overview:

As discussed upstream, parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key. (CVE-2015-5722 )

Also disclosed upstream today was CVE-2015-5986 which does not impact the version of bind in the Amazon Linux AMI.


Affected Packages:

bind


Issue Correction:
Run yum update bind to update your system.

New Packages:
i686:
    bind-9.8.2-0.30.rc1.39.amzn1.i686
    bind-libs-9.8.2-0.30.rc1.39.amzn1.i686
    bind-sdb-9.8.2-0.30.rc1.39.amzn1.i686
    bind-devel-9.8.2-0.30.rc1.39.amzn1.i686
    bind-debuginfo-9.8.2-0.30.rc1.39.amzn1.i686
    bind-chroot-9.8.2-0.30.rc1.39.amzn1.i686
    bind-utils-9.8.2-0.30.rc1.39.amzn1.i686

src:
    bind-9.8.2-0.30.rc1.39.amzn1.src

x86_64:
    bind-sdb-9.8.2-0.30.rc1.39.amzn1.x86_64
    bind-chroot-9.8.2-0.30.rc1.39.amzn1.x86_64
    bind-debuginfo-9.8.2-0.30.rc1.39.amzn1.x86_64
    bind-devel-9.8.2-0.30.rc1.39.amzn1.x86_64
    bind-9.8.2-0.30.rc1.39.amzn1.x86_64
    bind-utils-9.8.2-0.30.rc1.39.amzn1.x86_64
    bind-libs-9.8.2-0.30.rc1.39.amzn1.x86_64