Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1447743 - (CVE-2017-3139) CVE-2017-3139 bind: assertion failure in DNSSEC validation
CVE-2017-3139 bind: assertion failure in DNSSEC validation
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
Petr Sklenar
impact=important,public=20170508,repo...
: Security
Depends On: 1447407 1447869 1447872 1456915 1456916 1456917 1456919 1458736
Blocks: 1448138
  Show dependency treegraph
 
Reported: 2017-05-03 12:06 EDT by Dhiru Kholia
Modified: 2017-07-25 16:47 EDT (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-07-25 16:47:17 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1202 normal SHIPPED_LIVE Important: bind security update 2017-05-08 07:36:03 EDT
Red Hat Product Errata RHSA-2017:1582 normal SHIPPED_LIVE Important: bind security and bug fix update 2017-06-28 09:00:34 EDT

  None (edit)
Comment 1 Dhiru Kholia 2017-05-03 12:20:42 EDT
A denial of service flaw was found in the way BIND versions as shipped with RHEL 6 handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

This issue does not affect the upstream versions of BIND.

This issue does not affect BIND configurations which have DNSSEC validation turned off.
Comment 5 Dhiru Kholia 2017-05-05 02:05:29 EDT
Statement:

This issue affected only the BIND versions as shipped with Red Hat Enterprise Linux 6. This issue did not affect any upstream versions of BIND. This issue does not affect BIND configurations which have DNSSEC validation turned off.
Comment 8 errata-xmlrpc 2017-05-08 03:36:24 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:1202 https://access.redhat.com/errata/RHSA-2017:1202
Comment 13 Karthikeyan 2017-06-09 08:15:27 EDT
(In reply to Dhiru Kholia from comment #1)
> A denial of service flaw was found in the way BIND versions as shipped with
> RHEL 6 handled DNSSEC validation. A remote attacker could use this flaw to
> make named exit unexpectedly with an assertion failure via a specially
> crafted DNS response.
> 
> This issue does not affect the upstream versions of BIND.
> 
> This issue does not affect BIND configurations which have DNSSEC validation
> turned off.


Hi Dhiru,

Does it affect the bind version bind-9.8.2-0.47.rc1.el6_8.3.i686/x86_64.rpm.

These are not shipped package after that we have done up-gradation.

Regards,
Karthik
Comment 14 errata-xmlrpc 2017-06-28 05:03:36 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.4 Advanced Update Support
  Red Hat Enterprise Linux 6.5 Advanced Update Support
  Red Hat Enterprise Linux 6.5 Telco Extended Update Support
  Red Hat Enterprise Linux 6.6 Telco Extended Update Support
  Red Hat Enterprise Linux 6.7 Extended Update Support
  Red Hat Enterprise Linux 6.6 Advanced Update Support
  Red Hat Enterprise Linux 6.2 Advanced Update Support

Via RHSA-2017:1582 https://access.redhat.com/errata/RHSA-2017:1582

Note You need to log in before you can comment on or make changes to this bug.