IBM Support

SI68707 - OSP-DNS/Fix CVE-2018-5741 for DNS bind

PTF ( Program Temporary Fixes ) Cover letter


Order this fix

Abstract

OSP-DNS/Fix CVE-2018-5741 for DNS bind


Pre/Co-Requisite PTF / Fix List

REQ  LICENSED           PTF/FIX  LEVEL

TYPE PROGRAM  RELEASE   NUMBER   MIN/MAX  OPTION
---- -------- --------- -------  -------  ------
NONE



NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels.  This PTF may be a prerequisite
for future PTFs.  By applying this PTF you authorize and agree to the
foregoing.

This PTF is subject to the terms of the license agreement which
accompanied, or was contained in, the Program for which you are obtaining
the PTF.  You are not authorized to install or use the PTF except as part
of a Program for which you have a valid Proof of Entitlement.

SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.

The applicable license agreement may have been provided to you in printed
form and/or may be viewed using the Work with Software Agreements (WRKSFWAGR)
CL command.





APAR Error Description / Circumvention

-----------------------------------------------
ISC released CVE-2018-5741.
CVE-2018-5741: In order to provide fine-grained controls over
the ability to use Dynamic DNS (DDNS) to update records in a
zone, BIND provides a feature called update-policy. Various
rules can be configured to limit the types of updates that can
be performed by a client, depending on the key used when sending
the update request. Unfortunately some rule types were not
initially documented, and when documentation for them was added
to the Administrator Reference Manual (ARM), the language that
was added to the ARM at that time incorrectly described the
behavior of two rule types, krb5-subdomain and ms-subdomain.
This incorrect documentation could mislead operators into
believing that policies they had configured were more
restrictive than they actually were.

CORRECTION FOR APAR SE70250 :
-----------------------------
Fixed the problem with the ISC-provided fix.

CIRCUMVENTION FOR APAR SE70250 :
--------------------------------
None.


Activation Instructions


None.




Special Instructions


********************************************************************
THE FOLLOWING ARE SUPERSEDED SPECIAL INSTRUCTIONS. IF THE SUPERSEDED
PTF HAS ALREADY BEEN APPLIED AND ITS SPECIAL INSTRUCTION FOLLOWED,
IT IS NOT NECESSARY TO FOLLOW THAT SPECIAL INSTRUCTION AGAIN.
********************************************************************

SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI68466 :
=================================================

IF DNS SERVER IS NOT USED, THE PTF CAN BE IGNORED AND NO ACTION IS
REQUIRED. OTHERWISE, PLEASE SAVE DOMAIN NAME SERVER DATA AS A BACKUP
BEFORE APPLYING THE PTF. AND THEN FOLLOW THESE STEPS:
1. END ALL DOMAIN NAME SERVERS ON THE SYSTEM: ENDTCPSVR SERVER(*DNS)
DNSSVR(*ALL)
2. APPLY THE PTF
3. START ALL DOMAIN NAME SERVERS OR A SPECIFIED ONE: STRTCPSVR
SERVER(*DNS) DNSSVR(*ALL) OR STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)

SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI59086 :
=================================================

END DOMAIN NAME SERVERS ON THE SYSTEM
EXAMPLE: ENDTCPSVR SERVER(*DNS) DNSSVR(*ALL)
THEN APPLY THE PTF
START DOMAIN NAME SERVER AGAIN
EXAMPLE: STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)


Default Instructions

THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.



Supersedes

PTF/FIX NO(S).  APAR TITLE LINE
--------------  ------------------------------------------------------------
   SI68466      OSP-DNS/Fix CVE-2018-5740 for DNS bind
   SI66812      OSP-DNS/Fix CVE-2017-3145 for DNS bind
   SI65336      OSP-DNS/Refresh DNS BIND to fix CVE-2017-3142 and CVE-2017-3
   SI64614      OSP-DNS/Fix CVE-2017-3136 and CVE-2017-3137 for DNS bind
   SI63767      OSP-DNS/Fix CVE-2016-9131, CVE-2016-9444 and CVE-2017-3135 f
   SI62945      OSP-DNS/Fix CVE-2016-2775, CVE-2016-2776 and CVE-2016-8864 f
   SI60386      OSP-DNS/Fix CVE-2016-1285, CVE-2016-1286 and CVE-2016-2088 f
   SI59480      OSP-DNS/Fix CVE-2015-8704 and CVE-2015-8705 for DNS bind
   SI59086      OSP-DNS/Fix CVE-2015-8000 for DNS bind

Summary Information

System.............................. i
Models..............................
Release............................. V7R3M0
Licensed Program............... 5770SS1
APAR Fixed.......................... SE70250
Superseded by:...................... View fix details for PTF SI70733
Recompile........................... N
Library............................. QDNS
MRI Feature ........................ NONE
Cum Level........................... C9116730


IBM i Support

IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.

Document information

More support for: i family

Software version: V7R3M0

Operating system(s): OS/400

Reference #: SI68707

Modified date: 07 January 2019