Security update for bind8 and bindutil
Knowledgebase
(Last modified: 07AUG2002)
solutions Security update for bind8 and bindutil SuSE Linux Maintenance Web (1191cc48aa64547beb71e42bc5751e31)
SuSE Linux Admin-CD for Firewall
SuSE Linux Enterprise Server 7 for IBM zSeries
SuSE eMail Server III
SuSE Linux Enterprise Server 7 for PowerPC
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE Linux Enterprise Server for S/390
SuSE eMail Server 3.1
SuSE Linux Office Server
SuSE Firewall Adminhost VPN
SuSE Linux Connectivity Server
Package: bind8
bindutil
Release: 20020807
Obsoletes: none
The bug itself is a buffer overflow that can be triggered if a DNS server sends multiple CNAME records in a DNS response.
This bug has been fixed for the gethostbyXXX class of functions in GNU libc in 1999. Unfortunately, there is similar code in the getnetbyXXX functions in recent glibc implementations, and the code is enabled by default.
Until glibc patches are available, we recommend that you disable DNS lookups of network names in
nsswitch.conf
. Simply replace the line containing the tag "networks:" with this line:
networks: files
The resolver bug is also present in the libbind library included in BIND. This library is used by utilities included in the
bindutil
package. We are therefore providing security updates for
bind8
that address this vulnerability. As communicated previously, the SuSE security team is not providing fixes for BIND4 anymore. The
bind9
packages shipped by SuSE are not vulnerable to this bug. Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement.
You should at least upgrade the bindutil package using
rpm -Fvh bindutil*.rpm
rpm -Fvh bind8.rpm bindutil.rpm
If you are running the BIND name server, and updated the bind8 package, you should restart the name server process by issuing
rcnamed restart
Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.