Bug 1447743 (CVE-2017-3139)
Summary: | CVE-2017-3139 bind: assertion failure in DNSSEC validation | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhiru Kholia <dkholia> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | Petr Sklenar <psklenar> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | anemec, hasuzuki, karthikeyanthangavel7, pemensik, security-response-team, slong, thozza |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-07-25 20:47:17 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1447407, 1447869, 1447872, 1456915, 1456916, 1456917, 1456919, 1458736 | ||
Bug Blocks: | 1448138 |
Comment 1
Dhiru Kholia
2017-05-03 16:20:42 UTC
Statement: This issue affected only the BIND versions as shipped with Red Hat Enterprise Linux 6. This issue did not affect any upstream versions of BIND. This issue does not affect BIND configurations which have DNSSEC validation turned off. This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:1202 https://access.redhat.com/errata/RHSA-2017:1202 (In reply to Dhiru Kholia from comment #1) > A denial of service flaw was found in the way BIND versions as shipped with > RHEL 6 handled DNSSEC validation. A remote attacker could use this flaw to > make named exit unexpectedly with an assertion failure via a specially > crafted DNS response. > > This issue does not affect the upstream versions of BIND. > > This issue does not affect BIND configurations which have DNSSEC validation > turned off. Hi Dhiru, Does it affect the bind version bind-9.8.2-0.47.rc1.el6_8.3.i686/x86_64.rpm. These are not shipped package after that we have done up-gradation. Regards, Karthik This issue has been addressed in the following products: Red Hat Enterprise Linux 6.4 Advanced Update Support Red Hat Enterprise Linux 6.5 Advanced Update Support Red Hat Enterprise Linux 6.5 Telco Extended Update Support Red Hat Enterprise Linux 6.6 Telco Extended Update Support Red Hat Enterprise Linux 6.7 Extended Update Support Red Hat Enterprise Linux 6.6 Advanced Update Support Red Hat Enterprise Linux 6.2 Advanced Update Support Via RHSA-2017:1582 https://access.redhat.com/errata/RHSA-2017:1582 |