Yellow Dog Linux Security Announcement -------------------------------------- Package: bind Issue Date: August 10, 2002 Priority: high Advisory ID: YDU-20020810-3 1. Topic: Updated bind packages are available. 2. Problem: "Various versions of the ISC BIND resolver libraries are vulnerable to a buffer overflow attack. Updated BIND packages are now available to fix this issue. ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and various tools. A buffer overflow vulnerability exists in multiple implementations of DNS resolver libraries. Applications that utilize vulnerable DNS resolver libraries may be affected. A remote attacker who is able to send malicious DNS responses could potentially exploit this vulnerability to execute arbitrary code or cause a denial of service on a vulnerable system. [Yellow Dog] Linux does not ship with any applications or libraries that link against the BIND resolver libraries; however, third party code may be affected." (from Red Hat Advisory) 3. Solution: a) Updating via apt... We suggest that you use the apt-get program to keep your system up-to-date. The following command(s) will retrieve and install the fixed version of this update onto your system: apt-get update apt-get install bind b) Updating manually... Download the updates below for your version of Yellow Dog Linux and then run the following rpm command. (Please use a mirror site) rpm -Fvh [filenames] Yellow Dog Linux 2.3 ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.3/ ppc/bind-9.2.1-1.7x.2.3a.ppc.rpm ppc/bind-devel-9.2.1-1.7x.2.3a.ppc.rpm ppc/bind-utils-9.2.1-1.7x.2.3a.ppc.rpm Yellow Dog Linux 2.2 ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.2/ ppc/bind-9.2.1-1.7x.2.2a.ppc.rpm ppc/bind-devel-9.2.1-1.7x.2.2a.ppc.rpm ppc/bind-utils-9.2.1-1.7x.2.2a.ppc.rpm 4. Verification MD5 checksum Package -------------------------------- ---------------------------- [Yellow Dog Linux 2.3] 68229e7e4d5d955343cd802dd03be546 ppc/bind-9.2.1-1.7x.2.3a.ppc.rpm 7ba7eb3a413ead0902434931f73bae57 ppc/bind-devel-9.2.1-1.7x.2.3a.ppc.rpm b536136842ce6448c1f38977afbd73a9 ppc/bind-utils-9.2.1-1.7x.2.3a.ppc.rpm cf77e6b8a856c9c79f2002d90b3fcb05 SRPMS/bind-9.2.1-1.7x.2.3a.src.rpm [Yellow Dog Linux 2.2] 38337b682591493b1662f3dbbadb06a7 ppc/bind-9.2.1-1.7x.2.2a.ppc.rpm 234206c05a7c922a903aca3e493cf3ce ppc/bind-devel-9.2.1-1.7x.2.2a.ppc.rpm efdd56e59b81736eae14004577e19910 ppc/bind-utils-9.2.1-1.7x.2.2a.ppc.rpm db6e2f5d2b0a076eff4bba08f149be5b SRPMS/bind-9.2.1-1.7x.2.2a.src.rpm I wish to verify that each package has not been corrupted or tampered with, examine the md5sum with the following command: rpm --checksig --nogpg filename 5. Misc. Terra Soft has setup a moderated mailing list where these security, bugfix, and package enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more information. For information regarding the usage of apt-get, see: http://www.yellowdoglinux.com/support/solutions/ydl_general/apt-get.shtml