Bug 25724 - bind new security issues CVE-2019-6477 and CVE-2020-861[67]
Summary: bind new security issues CVE-2019-6477 and CVE-2020-861[67]
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2019-11-22 18:10 CET by David Walser
Modified: 2020-06-15 09:55 CEST (History)
6 users (show)

See Also:
Source RPM: bind-9.11.6-1.1.mga7.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2019-11-22 18:10:45 CET
ISC has issued an advisory on November 20:
https://kb.isc.org/docs/cve-2019-6477

The issue is fixed upstream in 9.11.13:
https://downloads.isc.org/isc/bind9/9.11.13/RELEASE-NOTES-bind-9.11.13.html

Mageia 7 is also affected.
David Walser 2019-11-22 18:10:52 CET

Whiteboard: (none) => MGA7TOO

Comment 1 Lewis Smith 2019-11-22 18:24:53 CET
Assigning globally of necessity.

Assignee: bugsquad => pkg-bugs

José Jorge 2019-11-22 22:31:28 CET

Assignee: pkg-bugs => lists.jjorge
CC: (none) => lists.jjorge

José Jorge 2019-11-22 22:35:14 CET

Assignee: lists.jjorge => guillomovitch

Comment 2 José Jorge 2019-11-22 22:35:48 CET
Sorry I thought it had no maintainer, leaving it to the maintainer.

Status: NEW => ASSIGNED

Comment 3 David Walser 2019-11-23 17:21:41 CET
Ubuntu has issued an advisory for this on November 21:
https://usn.ubuntu.com/4197-1/
Comment 4 David Walser 2019-12-27 03:48:01 CET
Fedora has issued an advisory for this on November 29:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/TAYHC7OZCN6L6SUFSQGMCJ5VQZZ4WPEC/

Severity: normal => major

Comment 5 David Walser 2020-01-14 17:45:56 CET
bind-9.11.13-1.mga8 uploaded for Cauldron by Guillaume 6 weeks ago.

Status comment: (none) => Fixed upstream in 9.11.13
Whiteboard: MGA7TOO => (none)
Version: Cauldron => 7

Comment 6 David Walser 2020-04-29 16:20:16 CEST
RedHat has issued an advisory for this on April 28:
https://access.redhat.com/errata/RHSA-2020:1845
Comment 7 David Walser 2020-05-19 19:45:22 CEST
ISC has issued advisories on May 19:
https://kb.isc.org/docs/cve-2020-8616
https://kb.isc.org/docs/cve-2020-8617

The issues are fixed upstream in 9.11.19:
https://downloads.isc.org/isc/bind9/9.11.19/RELEASE-NOTES-bind-9.11.19.html

Patches for all of these issues are at:
https://downloads.isc.org/isc/bind9/9.11.13/patches/
https://downloads.isc.org/isc/bind9/9.11.19/patches/

Whiteboard: (none) => MGA7TOO
Version: 7 => Cauldron
Status comment: Fixed upstream in 9.11.13 => Fixed upstream in 9.11.19
Summary: bind new security issue CVE-2019-6477 => bind new security issues CVE-2019-6477 and CVE-2020-861[67]
Source RPM: bind-9.11.9-2.mga8.src.rpm => bind-9.11.6-1.1.mga7.src.rpm

Comment 8 David Walser 2020-05-20 23:57:53 CEST
Debian and Ubuntu have issued advisories for this on May 19:
https://www.debian.org/security/2020/dsa-4689
https://usn.ubuntu.com/4365-1/
Comment 9 David Walser 2020-05-21 16:23:21 CEST
Guillaume has built bind-9.11.6-1.1.mga7 with the needed patches.

bind-9.11.6-1.1.mga7
bind-sdb-9.11.6-1.1.mga7
bind-utils-9.11.6-1.1.mga7
bind-dnssec-utils-9.11.6-1.1.mga7
libdns1105-9.11.6-1.1.mga7
libirs161-9.11.6-1.1.mga7
libisc1100-9.11.6-1.1.mga7
libbind9_161-9.11.6-1.1.mga7
liblwres161-9.11.6-1.1.mga7
libisccc161-9.11.6-1.1.mga7
libisccfg163-9.11.6-1.1.mga7
bind-devel-9.11.6-1.1.mga7
bind-chroot-9.11.6-1.1.mga7
bind-sdb-chroot-9.11.6-1.1.mga7
python3-bind-9.11.6-1.1.mga7

Now we just need Cauldron updated to 9.11.19.
Comment 10 Guillaume Rousse 2020-05-21 17:21:08 CEST
I'll wait for Fedora for 9.11.19, they are way too many patches to rebase first.
Comment 11 Nicolas Lécureuil 2020-05-29 01:03:23 CEST
they have now Guillaume :)

CC: (none) => mageia

Comment 12 David Walser 2020-05-29 02:40:03 CEST
Mageia 7 update in Comment 9.  Advisory to come.

Status comment: Fixed upstream in 9.11.19 => (none)
Version: Cauldron => 7
CC: (none) => guillomovitch
Assignee: guillomovitch => qa-bugs
Whiteboard: MGA7TOO => (none)

Comment 13 David Walser 2020-05-29 03:07:10 CEST
Advisory:
========================

Updated bind packages fix security vulnerabilities:

It was discovered that Bind incorrectly handled certain TCP-pipelined queries.
A remote attacker could possibly use this issue to cause Bind to consume
resources, resulting in a denial of service (CVE-2019-6477).

Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind
incorrectly limited certain fetches. A remote attacker could possibly use this
issue to cause Bind to consume resources, leading to a denial of service, or
possibly use Bind to perform a reflection attack (CVE-2020-8616).

Tobias Klein discovered that Bind incorrectly handled checking TSIG validity.
A remote attacker could use this issue to cause Bind to crash, resulting in a
denial of service, or possibly perform other attacks (CVE-2020-8617).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617
https://kb.isc.org/docs/cve-2019-6477
https://kb.isc.org/docs/cve-2020-8616
https://kb.isc.org/docs/cve-2020-8617
https://usn.ubuntu.com/4197-1/
https://usn.ubuntu.com/4365-1/
Comment 14 Herman Viaene 2020-05-29 16:09:12 CEST
MGA7-64 Plasma on Lenovo B50
No installation issues.
As client accessing my own DNS server in the LAN:all OK.
But still the same issue as in bug 24422: the default installation does not point to the chrooted environment which is configured when using MCC or webmin to populate the server records.
I'll leave the decision to OK this update to others, I find this unacceptable.

CC: (none) => herman.viaene

Comment 15 Nicolas Lécureuil 2020-05-29 17:08:27 CEST
yes but guillaume told he wants to udpate to 9.11.19. I think we can wait
Comment 16 Guillaume Rousse 2020-05-29 19:05:56 CEST
I mentionned version 9.11.19 for cauldron only, I don't see the point of pushing a new version in mageia 7.

Regarding the inconsistency issue with MCC and Webmin, this is not a regression and should not block security update. This kind of generic QA issues would be better handled at release time, not during the lifetime of the distribution.

And regarding the issue itself, the problem comes from those configuration tools making assumptions out of their control about default server installation path. Unless new chroot path is proven to be an explicit FHS (or other similar standard), I think it is a safer option to align with other distribution practices (especially when they are actually the upstream for package maintenance...) rather than on undocumented local distribution tools practices. Which means than MCC and Webmin should get updated, not bind package.
Comment 17 Nicolas Lécureuil 2020-05-29 21:11:17 CEST
my bad i misunderstood :) so let's go QA :)
Comment 18 Herman Viaene 2020-05-30 09:22:24 CEST
I understand Guillaume's point that it is not opportune to block this update for the reason I brought up.
And I do not mind what solution is finally taken. My frustration is that M6 was consistent in the use of the chroot option. M7 is a mixed bag. I'll keep that in mind for M8.
Comment 19 Herman Viaene 2020-06-13 13:54:57 CEST
Nothing to add, so let go.

Whiteboard: (none) => MGA7-64-OK

Comment 20 Thomas Andrews 2020-06-14 01:06:00 CEST
All right then, validating. Advisory in Comment 13.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Nicolas Lécureuil 2020-06-15 09:07:25 CEST

Keywords: (none) => advisory

Comment 21 Mageia Robot 2020-06-15 09:55:54 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2020-0259.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.