bind security update

2016-11-25T16:47:09
ID CESA-2016:2615
Type centos
Reporter CentOS Project
Modified 2016-11-25T16:47:09

Description

CentOS Errata and Security Advisory CESA-2016:2615

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

  • A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864)

Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-cr-announce/2016-November/003676.html

Affected packages: bind bind-chroot bind-devel bind-libs bind-libs-lite bind-license bind-lite-devel bind-pkcs11 bind-pkcs11-devel bind-pkcs11-libs bind-pkcs11-utils bind-sdb bind-sdb-chroot bind-utils

Upstream details at: https://rhn.redhat.com/errata/RHSA-2016-2615.html