IBM Support

SI62977 - OSP-DNS/Fix CVE-2016-2775, CVE-2016-2776 and CVE-2016-8864 f

PTF ( Program Temporary Fixes ) Cover letter


Order this fix

Abstract

OSP-DNS/Fix CVE-2016-2775, CVE-2016-2776 and CVE-2016-8864 f


Pre/Co-Requisite PTF / Fix List

REQ  LICENSED      PTF/FIX  LEVEL

TYPE PROGRAM  REL  NUMBER   MIN/MAX  OPTION
---- -------- ---  -------  -------  ------
NONE



NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels.  This PTF may be a prerequisite
for future PTFs.  By applying this PTF you authorize and agree to the
foregoing.

This PTF is subject to the terms of the license agreement which
accompanied, or was contained in, the Program for which you are obtaining
the PTF.  You are not authorized to install or use the PTF except as part
of a Program for which you have a valid Proof of Entitlement.

SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.

The applicable license agreement may have been provided to you in printed
form and/or may be viewed using the Work with Software Agreements (WRKSFWAGR)
CL command.


APAR Error Description / Circumvention

-------------------------------------------------
ISC released CVE-2016-2775, CVE-2016-2776 and CVE-2016-8864.
CVE-2016-2775: A query name which is too long can cause a
segmentation fault in lwresd.
CVE-2016-2776: A defect in the rendering of messages into
packets can cause named to exit with an assertion failure in
buffer.c while constructing a response to a query that meets
certain criteria. This assertion can be triggered even if the
apparent source address isn't allowed to make queries (i.e.
doesn't match 'allow-query').
CVE-2016-8864: A defect in BIND's handling of responses
containing a DNAME answer can cause a resolver to exit after
encountering an assertion failure in db.c or resolver.c.

CORRECTION FOR APAR 'SE66025' :
-------------------------------
Fixed the problems with the ISC-provided fixes.

CIRCUMVENTION FOR APAR 'SE66025' :
----------------------------------
None.


Activation Instructions

None.




Special Instructions

END DOMAIN NAME SERVERS ON THE SYSTEM
EXAMPLE: ENDTCPSVR SERVER(*DNS) DNSSVR(*ALL)
THEN APPLY THE PTF
START DOMAIN NAME SERVER AGAIN
EXAMPLE: STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)

********************************************************************
THE FOLLOWING ARE SUPERSEDED SPECIAL INSTRUCTIONS. IF THE SUPERSEDED
PTF HAS ALREADY BEEN APPLIED AND ITS SPECIAL INSTRUCTION FOLLOWED,
IT IS NOT NECESSARY TO FOLLOW THAT SPECIAL INSTRUCTION AGAIN.
********************************************************************

SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI61239 :
=================================================

PLEASE SAVE DOMAIN NAME SERVER DATA AS A BACKUP BEFORE APPLYING THE
PTF. AND THEN FOLLOW THESE STEPS:
1. END ALL DOMAIN NAME SERVERS ON THE SYSTEM: ENDTCPSVR SERVER(*DNS)
DNSSVR(*ALL)
2. APPLY THE PTF
3. START ALL DOMAIN NAME SERVERS OR A SPECIFIED ONE: STRTCPSVR
SERVER(*DNS) DNSSVR(*ALL) OR STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)

SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI40965 :
=================================================

Option 31 (Domain Name System) must be installed in the system before
apply this PTF.

SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI55748 :
=================================================

END DOMAIN NAME SERVERS ON THE SYSTEM
EXAMPLE: ENDTCPSVR SERVER(*DNS) DNSSVR(*ALL)
THEN APPLY THE PTF
START DOMAIN NAME SERVER AGAIN
EXAMPLE: STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)


Default Instructions

THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.



Supersedes

PTF/FIX NO(S).  APAR TITLE LINE
--------------  ------------------------------------------------------------
   SI61239      OSP-DNS upgrades from bind 9.7.4 to bind 9.10.1
   SI40965      OSP-DNS DYNAMIC PTR UPDATE WITH KEY NSUPDATE
   SI60348      OSP-DNS/Fix CVE-2016-1285 and CVE-2016-1286 for DNS bind
   SI59570      OSP-DNS CVE-2015-8704 SPECIFIC APL DATA COULD TRIGGER AN INS
   SI59101      OSP-DNS/Fix CVE-2015-8000 for DNS bind
   SI57654      TCPIP-CFG-UNPRED
   SI55748      OSP-DNS Fix for CVE-2014-8500:  A Defect in Delegation Handl
   SI51669      DNS - BIND upgraded to 9.7.4-P1
   SI45939      OSP-DNS-F/QP2SHELL2-T/QTOBDNS-MSGCPFB9C6 DNS SERVER CRASHES
   SI44999      OSP-DNS-INCORROUT NSLOOKUP OUTPUT WRONG
   SI37039      Integrity Problem

Summary Information

System.............................. i
Models..............................
Release............................. V7R1M0
Licensed Program............... 5770SS1
APAR Fixed.......................... SE66025
Superseded by:...................... View fix details for PTF SI70723
Recompile........................... N
Library............................. QDNS
MRI Feature ........................ NONE
Cum Level........................... NONE


IBM i Support

IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.

Document information

More support for: i family

Software version: V7R1M0

Operating system(s): OS/400

Reference #: SI62977

Modified date: 30 November 2016