A defect in BIND's handling of responses containing a DNAME answer can cause a resolver to exit after encountering an assertion failure in db.c or resolver.c During processing of a recursive response that contains a DNAME record in the answer section, BIND can stop execution after encountering an assertion error in resolver.c (error message: "INSIST((valoptions & 0x0002U) != 0) failed") or db.c (error message: "REQUIRE(targetp != ((void *)0) && *targetp == ((void *)0)) failed"). A server encountering either of these error conditions will stop, resulting in denial of service to clients. The risk to authoritative servers is minimal; recursive servers are chiefly at risk.
Acknowledgments: Name: ISC Upstream: Tony Finch (University of Cambridge), Marco Davids (SIDN Labs)
External References: https://kb.isc.org/article/AA-01434
Public via http://seclists.org/oss-sec/2016/q4/300
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2016:2142 https://rhn.redhat.com/errata/RHSA-2016-2142.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 5 Via RHSA-2016:2141 https://rhn.redhat.com/errata/RHSA-2016-2141.html
Is there a specific reason that no bug reports for Fedora were opened, too? Fedora 23+ are shipping bind-9.10.4-2.P3, but not P4 currently.
Created bind tracking bugs for this issue: Affects: fedora-all [bug 1391319]
Created bind99 tracking bugs for this issue: Affects: fedora-all [bug 1391320]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:2615 https://rhn.redhat.com/errata/RHSA-2016-2615.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.2 Advanced Update Support Red Hat Enterprise Linux 6.4 Advanced Update Support Red Hat Enterprise Linux 6.5 Advanced Update Support Red Hat Enterprise Linux 6.6 Advanced Update Support Red Hat Enterprise Linux 6.7 Extended Update Support Red Hat Enterprise Linux 6.5 Telco Extended Update Support Red Hat Enterprise Linux 6.6 Telco Extended Update Support Via RHSA-2016:2871 https://rhn.redhat.com/errata/RHSA-2016-2871.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Extended Update Support Via RHSA-2017:1583 https://access.redhat.com/errata/RHSA-2017:1583