| Summary: | maradns new DoS security issue | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | olchal, remco, sysadmin-bugs, wilcal.int |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/635767/ | ||
| Whiteboard: | has_procedure advisory MGA4-64-OK MGA4-32-OK | ||
| Source RPM: | maradns-1.4.14-1.1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-02-05 18:07:14 CET
David Walser
2015-02-05 18:07:39 CET
CC:
(none) =>
makowski.mageia LWN gave maradns its own entry for this (since it wouldn't technically be the same CVE, as it's different software). The BIND CVE-2014-8500 one was here: http://lwn.net/Vulnerabilities/625159/ URL:
http://lwn.net/Vulnerabilities/625159/ =>
http://lwn.net/Vulnerabilities/632576/ LWN moved the maradns ones to both be on the BIND vuln entry. URL:
http://lwn.net/Vulnerabilities/632576/ =>
http://lwn.net/Vulnerabilities/625159/
Remco Rijnders
2015-02-10 13:07:32 CET
Status:
NEW =>
ASSIGNED
Philippe Makowski
2015-02-21 19:03:29 CET
CC:
makowski.mageia =>
(none) Dropped from Cauldron for now. Feel free to resubmit it to Mageia 5 once it has been updated to 2.0.x. Version:
Cauldron =>
4 1.4.16 is available in core/updates_testing. No testing procedure is available, but I think verifying that the package installs and runs (see: https://wiki.mageia.org/en/QA_procedure:Maradns ) should suffice. CC:
(none) =>
remco Thanks Remmy! That will suffice as a testing procedure. Could you write an advisory for this one? Whiteboard:
(none) =>
has_procedure Testing on Mageia4x64 real hardware From current package : -------------------- maradns-1.4.14-1.1.mga4.x86_64 # systemctl start maradns didn't work as it complained port 53 was already in use. Had to reboot to start maradns Followed procedure mentionned in comment 4. OK maradns-1.4.16-1.1.mga4.x86_64 Rebooted # systemctl status -l maradns maradns.service - MaraDNS secure Domain Name Server (DNS) Loaded: loaded (/usr/lib/systemd/system/maradns.service; enabled) Active: active (running) since mar. 2015-03-03 16:02:19 CET; 42s ago Main PID: 1759 (maradns) CGroup: /system.slice/maradns.service ââ1759 /usr/sbin/maradns -f /etc/maradns/mararc.recursive Followed same procedure OK CC:
(none) =>
olchal In VirtualBox, M4, KDE, 32-bit
Package(s) under test:
maradns
default install of maradns
[root@localhost wilcal]# urpmi maradns
Package maradns-1.4.14-1.1.mga4.i586 is already installed
[root@localhost wilcal]# systemctl start maradns
seemed to start ok
install maradns from updates_testing
[root@localhost wilcal]# urpmi maradns
Package maradns-1.4.16-1.1.mga4.i586 is already installed
Seemed to install, stop and restart just fine.
[root@localhost wilcal]# systemctl status -l maradns
maradns.service - MaraDNS secure Domain Name Server (DNS)
Loaded: loaded (/usr/lib/systemd/system/maradns.service; enabled)
Active: active (running) since Wed 2015-03-04 11:37:59 PST; 3min 18s ago
Main PID: 13017 (maradns)
CGroup: /system.slice/maradns.service
ââ13017 /usr/sbin/maradns -f /etc/maradns/mararc.recursive
Test platform:
Intel Core i7-2600K Sandy Bridge 3.4GHz
GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo
GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB
RTL8111/8168B PCI Express 1Gbit Ethernet
DRAM 16GB (4 x 4GB)
Mageia 4 64-bit, Nvidia driver
virtualbox-4.3.10-1.1.mga4.x86_64
virtualbox-guest-additions-4.3.10-1.1.mga4.x86_64CC:
(none) =>
wilcal.int Looks ok. Your call olivier. Testing on Mageia4x32 real hardware, maradns-1.4.16-1.1.mga4 testing package I had same good results as William Configured as a recursive dns server, maradns worked well. OK then. Whiteboard:
has_procedure MGA4-64-OK =>
has_procedure MGA4-64-OK MGA4-32-OK Thanks for testing guys! Advisory: ========= maradns versions prior to 1.4.16 are vulnerable to a DoS-vulnerability through which a malicious authorative DNS-server can cause an infinite chain of referrals. For further details on the vulnerability, see https://www.kb.cert.org/vuls/id/264212 This update closes mga#15206 Validating. Advisory uploaded without CVE reference. Do you want to add one? Please push to 4 updates Thanks Keywords:
(none) =>
validated_update Technically this one doesn't have its own CVE. An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0092.html Status:
ASSIGNED =>
RESOLVED LWN created this entry: http://lwn.net/Vulnerabilities/635767/ Not sure if they'll keep it or merge it back into the BIND one. I gave them a heads up. Our advisory should grouped with the Fedora maradns ones, one way or another. Yep, they grouped the Fedora maradns advisories with ours, so maradns will keep its own page, which makes sense. URL:
http://lwn.net/Vulnerabilities/625159/ =>
http://lwn.net/Vulnerabilities/635767/ |