- Issued:
- 2017-06-28
- Updated:
- 2017-06-28
RHSA-2017:1583 - Important: bind security and bug fix update
Synopsis
Important: bind security and bug fix update
Type/Severity
Security Advisory Important
Topic
An update for bind is now available for Red Hat Enterprise Linux 7.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
-
A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864)
-
A denial of service flaw was found in the way BIND processed a response to an ANY query. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9131)
-
A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147)
-
A denial of service flaw was found in the way BIND handled an unusually-formed DS record response. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9444)
-
A denial of service flaw was found in the way BIND handled a query response containing CNAME or DNAME resource records in an unusual order. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3137)
Red Hat would like to thank ISC for reporting these issues. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters of CVE-2016-8864.
Bug Fix(es):
- ICANN is planning to perform a Root Zone DNSSEC Key Signing Key (KSK) rollover during October 2017. Maintaining an up-to-date KSK is essential for ensuring that validating DNS resolvers continue to function following the rollover. (BZ#1459648)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, the BIND daemon (named) will be restarted automatically.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 7.2 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 7.2 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 7.2 | ppc64le |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 7.2 | ppc64 |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 7.2 | s390x |
| Red Hat Enterprise Linux Server - TUS | 7.2 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 7.2 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 7.2 | x86_64 |
Updated Packages
- bind-libs-lite-9.9.4-29.el7_2.6.x86_64.rpm
- bind-sdb-9.9.4-29.el7_2.6.ppc64.rpm
- bind-9.9.4-29.el7_2.6.src.rpm
- bind-pkcs11-devel-9.9.4-29.el7_2.6.s390x.rpm
- bind-chroot-9.9.4-29.el7_2.6.ppc64.rpm
- bind-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-devel-9.9.4-29.el7_2.6.x86_64.rpm
- bind-lite-devel-9.9.4-29.el7_2.6.ppc.rpm
- bind-utils-9.9.4-29.el7_2.6.ppc64.rpm
- bind-debuginfo-9.9.4-29.el7_2.6.s390x.rpm
- bind-pkcs11-9.9.4-29.el7_2.6.ppc64.rpm
- bind-libs-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-pkcs11-devel-9.9.4-29.el7_2.6.i686.rpm
- bind-pkcs11-libs-9.9.4-29.el7_2.6.i686.rpm
- bind-pkcs11-devel-9.9.4-29.el7_2.6.s390.rpm
- bind-utils-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-debuginfo-9.9.4-29.el7_2.6.i686.rpm
- bind-devel-9.9.4-29.el7_2.6.ppc64.rpm
- bind-libs-lite-9.9.4-29.el7_2.6.s390.rpm
- bind-debuginfo-9.9.4-29.el7_2.6.ppc64.rpm
- bind-lite-devel-9.9.4-29.el7_2.6.ppc64.rpm
- bind-sdb-chroot-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-pkcs11-utils-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-pkcs11-devel-9.9.4-29.el7_2.6.ppc.rpm
- bind-pkcs11-libs-9.9.4-29.el7_2.6.s390.rpm
- bind-debuginfo-9.9.4-29.el7_2.6.ppc.rpm
- bind-chroot-9.9.4-29.el7_2.6.s390x.rpm
- bind-9.9.4-29.el7_2.6.x86_64.rpm
- bind-libs-9.9.4-29.el7_2.6.s390.rpm
- bind-chroot-9.9.4-29.el7_2.6.x86_64.rpm
- bind-libs-lite-9.9.4-29.el7_2.6.s390x.rpm
- bind-libs-lite-9.9.4-29.el7_2.6.ppc.rpm
- bind-pkcs11-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-pkcs11-9.9.4-29.el7_2.6.s390x.rpm
- bind-devel-9.9.4-29.el7_2.6.ppc.rpm
- bind-pkcs11-libs-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-sdb-chroot-9.9.4-29.el7_2.6.s390x.rpm
- bind-libs-lite-9.9.4-29.el7_2.6.i686.rpm
- bind-devel-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-libs-9.9.4-29.el7_2.6.x86_64.rpm
- bind-devel-9.9.4-29.el7_2.6.s390.rpm
- bind-pkcs11-devel-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-9.9.4-29.el7_2.6.s390x.rpm
- bind-pkcs11-libs-9.9.4-29.el7_2.6.ppc64.rpm
- bind-libs-9.9.4-29.el7_2.6.ppc.rpm
- bind-libs-9.9.4-29.el7_2.6.ppc64.rpm
- bind-sdb-chroot-9.9.4-29.el7_2.6.ppc64.rpm
- bind-pkcs11-libs-9.9.4-29.el7_2.6.ppc.rpm
- bind-libs-lite-9.9.4-29.el7_2.6.ppc64.rpm
- bind-debuginfo-9.9.4-29.el7_2.6.s390.rpm
- bind-lite-devel-9.9.4-29.el7_2.6.s390x.rpm
- bind-lite-devel-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-debuginfo-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-libs-lite-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-sdb-9.9.4-29.el7_2.6.s390x.rpm
- bind-lite-devel-9.9.4-29.el7_2.6.i686.rpm
- bind-libs-9.9.4-29.el7_2.6.i686.rpm
- bind-sdb-chroot-9.9.4-29.el7_2.6.x86_64.rpm
- bind-lite-devel-9.9.4-29.el7_2.6.x86_64.rpm
- bind-utils-9.9.4-29.el7_2.6.s390x.rpm
- bind-pkcs11-devel-9.9.4-29.el7_2.6.ppc64.rpm
- bind-devel-9.9.4-29.el7_2.6.s390x.rpm
- bind-pkcs11-utils-9.9.4-29.el7_2.6.ppc64.rpm
- bind-devel-9.9.4-29.el7_2.6.i686.rpm
- bind-pkcs11-devel-9.9.4-29.el7_2.6.x86_64.rpm
- bind-pkcs11-libs-9.9.4-29.el7_2.6.x86_64.rpm
- bind-pkcs11-9.9.4-29.el7_2.6.x86_64.rpm
- bind-pkcs11-utils-9.9.4-29.el7_2.6.x86_64.rpm
- bind-pkcs11-utils-9.9.4-29.el7_2.6.s390x.rpm
- bind-9.9.4-29.el7_2.6.ppc64.rpm
- bind-debuginfo-9.9.4-29.el7_2.6.x86_64.rpm
- bind-libs-9.9.4-29.el7_2.6.s390x.rpm
- bind-sdb-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-chroot-9.9.4-29.el7_2.6.ppc64le.rpm
- bind-sdb-9.9.4-29.el7_2.6.x86_64.rpm
- bind-license-9.9.4-29.el7_2.6.noarch.rpm
- bind-pkcs11-libs-9.9.4-29.el7_2.6.s390x.rpm
- bind-lite-devel-9.9.4-29.el7_2.6.s390.rpm
- bind-utils-9.9.4-29.el7_2.6.x86_64.rpm
Fixes
- This content is not included.BZ - 1389652
- This content is not included.BZ - 1411348
- This content is not included.BZ - 1411367
- This content is not included.BZ - 1411377
- This content is not included.BZ - 1441133
CVEs
References
- https://access.redhat.com/security/updates/classification/#important
- Content from kb.isc.org is not included.Content from kb.isc.org is not included.https://kb.isc.org/article/AA-01434
- Content from kb.isc.org is not included.Content from kb.isc.org is not included.https://kb.isc.org/article/AA-01439
- Content from kb.isc.org is not included.Content from kb.isc.org is not included.https://kb.isc.org/article/AA-01440
- Content from kb.isc.org is not included.Content from kb.isc.org is not included.https://kb.isc.org/article/AA-01441
- Content from kb.isc.org is not included.Content from kb.isc.org is not included.https://kb.isc.org/article/AA-01466
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.