SUSE Security Update: Security update for bind
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:2697-1
Rating:             important
References:         #1007829 #965748 
Cross-References:   CVE-2016-8864
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Software Development Kit 12-SP1
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Desktop 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:


   This update for bind fixes the following issues:

   - A defect in BIND's handling of responses containing a DNAME answer had
     the potential to trigger assertion errors in the server remotely,
     thereby facilitating a denial-of-service attack. (CVE-2016-8864,
     bsc#1007829).

   - Fix BIND to return a valid hostname in response to ldapdump queries.
     (bsc#965748)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1588=1

   - SUSE Linux Enterprise Software Development Kit 12-SP1:

      zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1588=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1588=1

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1588=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1588=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1588=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      bind-debuginfo-9.9.9P1-49.1
      bind-debugsource-9.9.9P1-49.1
      bind-devel-9.9.9P1-49.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

      bind-debuginfo-9.9.9P1-49.1
      bind-debugsource-9.9.9P1-49.1
      bind-devel-9.9.9P1-49.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):

      bind-9.9.9P1-49.1
      bind-chrootenv-9.9.9P1-49.1
      bind-debuginfo-9.9.9P1-49.1
      bind-debugsource-9.9.9P1-49.1
      bind-libs-9.9.9P1-49.1
      bind-libs-debuginfo-9.9.9P1-49.1
      bind-utils-9.9.9P1-49.1
      bind-utils-debuginfo-9.9.9P1-49.1

   - SUSE Linux Enterprise Server 12-SP2 (x86_64):

      bind-libs-32bit-9.9.9P1-49.1
      bind-libs-debuginfo-32bit-9.9.9P1-49.1

   - SUSE Linux Enterprise Server 12-SP2 (noarch):

      bind-doc-9.9.9P1-49.1

   - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

      bind-9.9.9P1-49.1
      bind-chrootenv-9.9.9P1-49.1
      bind-debuginfo-9.9.9P1-49.1
      bind-debugsource-9.9.9P1-49.1
      bind-libs-9.9.9P1-49.1
      bind-libs-debuginfo-9.9.9P1-49.1
      bind-utils-9.9.9P1-49.1
      bind-utils-debuginfo-9.9.9P1-49.1

   - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):

      bind-libs-32bit-9.9.9P1-49.1
      bind-libs-debuginfo-32bit-9.9.9P1-49.1

   - SUSE Linux Enterprise Server 12-SP1 (noarch):

      bind-doc-9.9.9P1-49.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      bind-debuginfo-9.9.9P1-49.1
      bind-debugsource-9.9.9P1-49.1
      bind-libs-32bit-9.9.9P1-49.1
      bind-libs-9.9.9P1-49.1
      bind-libs-debuginfo-32bit-9.9.9P1-49.1
      bind-libs-debuginfo-9.9.9P1-49.1
      bind-utils-9.9.9P1-49.1
      bind-utils-debuginfo-9.9.9P1-49.1

   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

      bind-debuginfo-9.9.9P1-49.1
      bind-debugsource-9.9.9P1-49.1
      bind-libs-32bit-9.9.9P1-49.1
      bind-libs-9.9.9P1-49.1
      bind-libs-debuginfo-32bit-9.9.9P1-49.1
      bind-libs-debuginfo-9.9.9P1-49.1
      bind-utils-9.9.9P1-49.1
      bind-utils-debuginfo-9.9.9P1-49.1


References:

   https://www.suse.com/security/cve/CVE-2016-8864.html
   https://bugzilla.suse.com/1007829
   https://bugzilla.suse.com/965748

SuSE: 2016:2697-1: important: bind

November 2, 2016
An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata is ...

Summary

This update for bind fixes the following issues: - A defect in BIND's handling of responses containing a DNAME answer had the potential to trigger assertion errors in the server remotely, thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829). - Fix BIND to return a valid hostname in response to ldapdump queries. (bsc#965748) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1588=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1588=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1588=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1588=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1588=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1588=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): bind-debuginfo-9.9.9P1-49.1 bind-debugsource-9.9.9P1-49.1 bind-devel-9.9.9P1-49.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): bind-debuginfo-9.9.9P1-49.1 bind-debugsource-9.9.9P1-49.1 bind-devel-9.9.9P1-49.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): bind-9.9.9P1-49.1 bind-chrootenv-9.9.9P1-49.1 bind-debuginfo-9.9.9P1-49.1 bind-debugsource-9.9.9P1-49.1 bind-libs-9.9.9P1-49.1 bind-libs-debuginfo-9.9.9P1-49.1 bind-utils-9.9.9P1-49.1 bind-utils-debuginfo-9.9.9P1-49.1 - SUSE Linux Enterprise Server 12-SP2 (x86_64): bind-libs-32bit-9.9.9P1-49.1 bind-libs-debuginfo-32bit-9.9.9P1-49.1 - SUSE Linux Enterprise Server 12-SP2 (noarch): bind-doc-9.9.9P1-49.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): bind-9.9.9P1-49.1 bind-chrootenv-9.9.9P1-49.1 bind-debuginfo-9.9.9P1-49.1 bind-debugsource-9.9.9P1-49.1 bind-libs-9.9.9P1-49.1 bind-libs-debuginfo-9.9.9P1-49.1 bind-utils-9.9.9P1-49.1 bind-utils-debuginfo-9.9.9P1-49.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): bind-libs-32bit-9.9.9P1-49.1 bind-libs-debuginfo-32bit-9.9.9P1-49.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): bind-doc-9.9.9P1-49.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): bind-debuginfo-9.9.9P1-49.1 bind-debugsource-9.9.9P1-49.1 bind-libs-32bit-9.9.9P1-49.1 bind-libs-9.9.9P1-49.1 bind-libs-debuginfo-32bit-9.9.9P1-49.1 bind-libs-debuginfo-9.9.9P1-49.1 bind-utils-9.9.9P1-49.1 bind-utils-debuginfo-9.9.9P1-49.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): bind-debuginfo-9.9.9P1-49.1 bind-debugsource-9.9.9P1-49.1 bind-libs-32bit-9.9.9P1-49.1 bind-libs-9.9.9P1-49.1 bind-libs-debuginfo-32bit-9.9.9P1-49.1 bind-libs-debuginfo-9.9.9P1-49.1 bind-utils-9.9.9P1-49.1 bind-utils-debuginfo-9.9.9P1-49.1

References

#1007829 #965748

Cross- CVE-2016-8864

Affected Products:

SUSE Linux Enterprise Software Development Kit 12-SP2

SUSE Linux Enterprise Software Development Kit 12-SP1

SUSE Linux Enterprise Server 12-SP2

SUSE Linux Enterprise Server 12-SP1

SUSE Linux Enterprise Desktop 12-SP2

SUSE Linux Enterprise Desktop 12-SP1

https://www.suse.com/security/cve/CVE-2016-8864.html

https://bugzilla.suse.com/1007829

https://bugzilla.suse.com/965748

Severity
Announcement ID: SUSE-SU-2016:2697-1
Rating: important

Related News