bind97 security update

2016-11-02T16:06:46
ID CESA-2016:2142
Type centos
Reporter CentOS Project
Modified 2016-11-02T16:06:46

Description

CentOS Errata and Security Advisory CESA-2016:2142

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

  • A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864)

Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2016-November/022138.html

Affected packages: bind97 bind97-chroot bind97-devel bind97-libs bind97-utils

Upstream details at: https://rhn.redhat.com/errata/RHSA-2016-2142.html