Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1389652 - (CVE-2016-8864) CVE-2016-8864 bind: assertion failure while handling responses containing a DNAME answer
CVE-2016-8864 bind: assertion failure while handling responses containing a D...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
Petr Sklenar
impact=important,public=20161101,repo...
: Security
Depends On: 1390127 1390128 1390129 1390130 1390131 1390159 1391319 1391320 1398197 1398199 1398200 1398201 1398202 1457186
Blocks: 1389641
  Show dependency treegraph
 
Reported: 2016-10-28 02:12 EDT by Dhiru Kholia
Modified: 2017-06-28 05:01 EDT (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-12-06 06:25:12 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:2141 normal SHIPPED_LIVE Important: bind security update 2016-11-02 17:38:01 EDT
Red Hat Product Errata RHSA-2016:2142 normal SHIPPED_LIVE Important: bind97 security update 2016-11-02 16:07:20 EDT
Red Hat Product Errata RHSA-2016:2615 normal SHIPPED_LIVE Important: bind security update 2016-11-03 13:06:18 EDT
Red Hat Product Errata RHSA-2016:2871 normal SHIPPED_LIVE Important: bind security update 2016-12-06 05:35:35 EST
Red Hat Product Errata RHSA-2017:1583 normal SHIPPED_LIVE Important: bind security and bug fix update 2017-06-28 09:00:18 EDT

  None (edit)
Description Dhiru Kholia 2016-10-28 02:12:18 EDT
A defect in BIND's handling of responses containing a DNAME answer
can cause a resolver to exit after encountering an assertion failure
in db.c or resolver.c

During processing of a recursive response that contains a DNAME
record in the answer section, BIND can stop execution after
encountering an assertion error in resolver.c (error message:
"INSIST((valoptions & 0x0002U) != 0) failed") or db.c (error
message: "REQUIRE(targetp != ((void *)0) && *targetp == ((void
*)0)) failed").

A server encountering either of these error conditions will stop,
resulting in denial of service to clients. The risk to authoritative
servers is minimal; recursive servers are chiefly at risk.
Comment 1 Dhiru Kholia 2016-10-28 02:12:30 EDT
Acknowledgments:

Name: ISC
Upstream: Tony Finch (University of Cambridge), Marco Davids (SIDN Labs)
Comment 8 Dhiru Kholia 2016-11-02 00:42:35 EDT
External References:

https://kb.isc.org/article/AA-01434
Comment 9 Dhiru Kholia 2016-11-02 03:44:12 EDT
Public via http://seclists.org/oss-sec/2016/q4/300
Comment 10 errata-xmlrpc 2016-11-02 14:25:07 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2016:2142 https://rhn.redhat.com/errata/RHSA-2016-2142.html
Comment 11 errata-xmlrpc 2016-11-02 14:29:22 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 5

Via RHSA-2016:2141 https://rhn.redhat.com/errata/RHSA-2016-2141.html
Comment 12 Robert Scheck 2016-11-02 17:11:15 EDT
Is there a specific reason that no bug reports for Fedora were opened, too?
Fedora 23+ are shipping bind-9.10.4-2.P3, but not P4 currently.
Comment 13 Dhiru Kholia 2016-11-02 23:57:44 EDT
Created bind tracking bugs for this issue:

Affects: fedora-all [bug 1391319]
Comment 14 Dhiru Kholia 2016-11-02 23:58:19 EDT
Created bind99 tracking bugs for this issue:

Affects: fedora-all [bug 1391320]
Comment 15 errata-xmlrpc 2016-11-04 05:04:23 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2615 https://rhn.redhat.com/errata/RHSA-2016-2615.html
Comment 17 errata-xmlrpc 2016-12-06 00:35:57 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 Advanced Update Support
  Red Hat Enterprise Linux 6.4 Advanced Update Support
  Red Hat Enterprise Linux 6.5 Advanced Update Support
  Red Hat Enterprise Linux 6.6 Advanced Update Support
  Red Hat Enterprise Linux 6.7 Extended Update Support
  Red Hat Enterprise Linux 6.5 Telco Extended Update Support
  Red Hat Enterprise Linux 6.6 Telco Extended Update Support

Via RHSA-2016:2871 https://rhn.redhat.com/errata/RHSA-2016-2871.html
Comment 19 errata-xmlrpc 2017-06-28 05:01:37 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.2 Extended Update Support

Via RHSA-2017:1583 https://access.redhat.com/errata/RHSA-2017:1583

Note You need to log in before you can comment on or make changes to this bug.