cvrf2cusa/cvrf/2021/cvrf-openEuler-SA-2021-1206.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

157 lines
10 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for bind is now available for openEuler-20.03-LTS-SP1</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2021-1206</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2021-06-07</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2021-06-07</InitialReleaseDate>
<CurrentReleaseDate>2021-06-07</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2021-06-07</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">bind security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for bind is now available for openEuler-20.03-LTS-SP1.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols and provides an openly redistributable reference implementation of the major components of the Domain Name System. This package includes the components to operate a DNS server.
Security Fix(es):
In BIND 9.8.5 -&gt; 9.8.8, 9.9.3 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.(CVE-2021-25214)
In BIND 9.0.0 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.(CVE-2021-25215)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for bind is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">bind</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1206</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-25214</URL>
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-25215</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-25214</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-25215</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="bind-debugsource-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-debugsource-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-debuginfo-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-debuginfo-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-chroot-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-chroot-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-pkcs11-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-pkcs11-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-devel-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-devel-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-utils-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-utils-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-pkcs11-devel-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-pkcs11-devel-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-libs-lite-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-libs-lite-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-libs-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-libs-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-export-libs-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-export-libs-9.11.21-6.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="bind-export-devel-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-export-devel-9.11.21-6.oe1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="python3-bind-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">python3-bind-9.11.21-6.oe1.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="bind-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-9.11.21-6.oe1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="bind-libs-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-libs-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-debugsource-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-debugsource-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-utils-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-utils-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-chroot-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-chroot-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-debuginfo-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-debuginfo-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-libs-lite-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-libs-lite-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-devel-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-devel-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-pkcs11-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-pkcs11-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-export-devel-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-export-devel-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-pkcs11-devel-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-pkcs11-devel-9.11.21-6.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="bind-export-libs-9.11.21-6" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">bind-export-libs-9.11.21-6.oe1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly</Note>
</Notes>
<ReleaseDate>2021-06-07</ReleaseDate>
<CVE>CVE-2021-25214</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>6.5</BaseScore>
<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>bind security update</Description>
<DATE>2021-06-07</DATE>
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1206</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself</Note>
</Notes>
<ReleaseDate>2021-06-07</ReleaseDate>
<CVE>CVE-2021-25215</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>bind security update</Description>
<DATE>2021-06-07</DATE>
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1206</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>