BIND: Handling responses containing a DNAME answer can lead to an assertion failure (CVE-2016-8864)
This document (7018224) is provided subject to the disclaimer at the end of this document.
SUSE Linux Enterprise Server 12 GA LTSS (SLES 12 GA LTSS)
SUSE Linux Enterprise Server 11 Service Pack 4 (SLES 11 SP4)
SUSE Linux Enterprise Server 11 Service Pack 3 LTSS (SLES 11 SP3 LTSS)
SUSE Linux Enterprise Server 11 Service Pack 2 LTSS (SLES 11 SP2 LTSS)
The problem is basically a remote Denial of Service (DoS) attack when bind is handling special DNAME response records. This vulnerability can potentially be exploited against all BIND 9 servers.
All versions prior to the current BIND release are affected.
Further details can be found here.
SLES 12 SP1
- bind-9.9.9P1-49.1 was released 2nd of November 2016
SLES 12 GA LTSS
- bind-9.9.9P1-28.23.1 was released 2nd of November 2016
SUSE recommends to patch all affected servers as soon as possible.
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:7018224
- Creation Date: 02-Nov-2016
- Modified Date:03-Mar-2020
- SUSE Linux Enterprise Server
For questions or concerns with the SUSE Knowledgebase please contact: firstname.lastname@example.org