An unusually-formed answer containing a DS resource record could trigger an assertion failure. While the combination of properties which triggers the assertion should not occur in normal traffic, it is potentially possible for the assertion to be triggered deliberately by an attacker sending a specially-constructed answer having the required properties. This vulnerability occurs during the processing of an answer packet received in response to a query. As a result, recursive servers are at the greatest risk; authoritative servers are at risk only to the extent that they perform a limited set of queries. This description is borrowed from the upstream advisory.
Acknowledgments: Name: ISC
Created bind tracking bugs for this issue: Affects: fedora-all [bug 1412462]
Created bind99 tracking bugs for this issue: Affects: fedora-all [bug 1412463]
External References: https://kb.isc.org/article/AA-01441
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:0062 https://rhn.redhat.com/errata/RHSA-2017-0062.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Extended Update Support Via RHSA-2017:1583 https://access.redhat.com/errata/RHSA-2017:1583