Bug 1715352 (CVE-2019-6469)

Summary: CVE-2019-6469 bind: an error in the EDNS Client Subnet (ECS) feature for recursive resolvers can cause BIND to exit with an assertion failure leading to DoS
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: anon.amish, extras-orphan, jpopelka, mruprich, msehnout, pemensik, pzhukov, thozza, vonsch, zdohnal
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-04 05:01:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1715353    

Description Marian Rehak 2019-05-30 07:44:07 UTC
This issue only affects BIND Supported Preview Edition version 9.10.5-S1 -> 9.11.6-S1! An error in the EDNS Client Subnet (ECS) feature for recursive resolvers can cause BIND to exit with an assertion failure when processing a response that has malformed RRSIGs.

External References:

https://kb.isc.org/docs/cve-2019-6469

Comment 1 Huzaifa S. Sidhpurwala 2019-06-04 05:01:35 UTC
Statement:

This flaw only affects the BIND Supported Preview Edition version. Packages shipped with Red Hat Enterprise Linux are not affected by this flaw.