PTF Cover Letter
PTF ( Program Temporary Fixes ) Cover letter
OSP-DNS/Fix CVE-2018-5744, CVE-2018-5745 and CVE-2019-6465 f
Pre/Co-Requisite PTF / Fix List
REQ LICENSED PTF/FIX LEVEL
TYPE PROGRAM REL NUMBER MIN/MAX OPTION
---- -------- --- ------- ------- ------
NONE
NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels. This PTF may be a prerequisite
for future PTFs. By applying this PTF you authorize and agree to the
foregoing.
This PTF is subject to the terms of the license agreement which
accompanied, or was contained in, the Program for which you are obtaining
the PTF. You are not authorized to install or use the PTF except as part
of a Program for which you have a valid Proof of Entitlement.
SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.
The applicable license agreement may have been provided to you in printed
form and/or may be viewed using the Work with Software Agreements (WRKSFWAGR)
CL command.
APAR Error Description / Circumvention
-------------------------------------------------
ISC released CVE-2018-5744, CVE-2018-5745 and CVE-2019-6465.
CVE-2018-5744: A failure to free memory can occur when
processing messages having a specific combination of EDNS
options.
CVE-2018-5745: "managed-keys" is a feature which allows a BIND
resolver to automatically maintain the keys used by trust
anchors which operators configure for use in DNSSEC validation.
Due to an error in the managed-keys feature it is possible for a
BIND server which uses managed-keys to exit due to an assertion
failure if, during key rollover, a trust anchor's keys are
replaced with keys which use an unsupported algorithm.
CVE-2019-6465: Controls for zone transfers may not be properly
applied to Dynamically Loadable Zones (DLZs) if the zones are
writable.
CORRECTION FOR APAR 'SE70631' :
-------------------------------
Fixed the problems with the ISC-provided fixes.
CIRCUMVENTION FOR APAR 'SE70631' :
----------------------------------
None.
Activation Instructions
None.
Special Instructions
IF DNS SERVER IS NOT USED, THE PTF CAN BE IGNORED AND NO ACTION IS
REQUIRED. OTHERWISE, PLEASE SAVE DOMAIN NAME SERVER DATA AS A BACKUP
BEFORE APPLYING THE PTF. AND THEN FOLLOW THESE STEPS:
1. END ALL DOMAIN NAME SERVERS ON THE SYSTEM: ENDTCPSVR SERVER(*DNS)
DNSSVR(*ALL)
2. APPLY THE PTF
3. START ALL DOMAIN NAME SERVERS OR A SPECIFIED ONE: STRTCPSVR
SERVER(*DNS) DNSSVR(*ALL) OR STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)
********************************************************************
THE FOLLOWING ARE SUPERSEDED SPECIAL INSTRUCTIONS. IF THE SUPERSEDED
PTF HAS ALREADY BEEN APPLIED AND ITS SPECIAL INSTRUCTION FOLLOWED,
IT IS NOT NECESSARY TO FOLLOW THAT SPECIAL INSTRUCTION AGAIN.
********************************************************************
SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI68478 :
=================================================
IF DNS SERVER IS NOT USED, THE PTF CAN BE IGNORED AND NO ACTION IS
REQUIRED. OTHERWISE, PLEASE SAVE DOMAIN NAME SERVER DATA AS A BACKUP
BEFORE APPLYING THE PTF. AND THEN FOLLOW THESE STEPS:
1. END ALL DOMAIN NAME SERVERS ON THE SYSTEM: ENDTCPSVR SERVER(*DNS)
DNSSVR(*ALL)
2. APPLY THE PTF
3. START ALL DOMAIN NAME SERVERS OR A SPECIFIED ONE: STRTCPSVR
SERVER(*DNS) DNSSVR(*ALL) OR STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)
SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI63738 :
=================================================
Option 31(Domain Name System) must be installed in the system before
applying the PTF.
SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI61239 :
=================================================
PLEASE SAVE DOMAIN NAME SERVER DATA AS A BACKUP BEFORE APPLYING THE
PTF. AND THEN FOLLOW THESE STEPS:
1. END ALL DOMAIN NAME SERVERS ON THE SYSTEM: ENDTCPSVR SERVER(*DNS)
DNSSVR(*ALL)
2. APPLY THE PTF
3. START ALL DOMAIN NAME SERVERS OR A SPECIFIED ONE: STRTCPSVR
SERVER(*DNS) DNSSVR(*ALL) OR STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)
SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI40965 :
=================================================
Option 31 (Domain Name System) must be installed in the system before
apply this PTF.
SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI55748 :
=================================================
END DOMAIN NAME SERVERS ON THE SYSTEM
EXAMPLE: ENDTCPSVR SERVER(*DNS) DNSSVR(*ALL)
THEN APPLY THE PTF
START DOMAIN NAME SERVER AGAIN
EXAMPLE: STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)
Default Instructions
THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.
Supersedes
PTF/FIX NO(S). APAR TITLE LINE
-------------- ------------------------------------------------------------
SI68705 OSP-DNS/Fix CVE-2018-5741 for DNS bind
SI68478 OSP-DNS/Fix CVE-2018-5740 for DNS bind
SI66583 OSP-MSGMCH4426-PAR RUNDNSUPD COMMAND GETS MCH4426 ESCAPE MES
SI66814 OSP-DNS/Fix CVE-2017-3145 for DNS bind
SI65338 OSP-DNS/Refresh DNS BIND to fix CVE-2017-3142 and CVE-2017-3
SI64615 OSP-DNS/Fix CVE-2017-3136 and CVE-2017-3137 for DNS bind
SI63774 OSP-DNS/Fix CVE-2016-9131, CVE-2016-9444 and CVE-2017-3135 f
SI63738 OSP-INCORROUT USING STRHOSTQRY GIVES INCORRECT OUT PUT WHEN
SI62977 OSP-DNS/Fix CVE-2016-2775, CVE-2016-2776 and CVE-2016-8864 f
SI61239 OSP-DNS upgrades from bind 9.7.4 to bind 9.10.1
SI40965 OSP-DNS DYNAMIC PTR UPDATE WITH KEY NSUPDATE
SI60348 OSP-DNS/Fix CVE-2016-1285 and CVE-2016-1286 for DNS bind
SI59570 OSP-DNS CVE-2015-8704 SPECIFIC APL DATA COULD TRIGGER AN INS
SI59101 OSP-DNS/Fix CVE-2015-8000 for DNS bind
SI57654 TCPIP-CFG-UNPRED
SI55748 OSP-DNS Fix for CVE-2014-8500: A Defect in Delegation Handl
SI51669 DNS - BIND upgraded to 9.7.4-P1
SI45939 OSP-DNS-F/QP2SHELL2-T/QTOBDNS-MSGCPFB9C6 DNS SERVER CRASHES
SI44999 OSP-DNS-INCORROUT NSLOOKUP OUTPUT WRONG
SI37039 Integrity Problem
Summary Information
System.............................. | i |
Models.............................. | |
Release............................. | V7R1M0 |
Licensed Program............... | 5770SS1 |
APAR Fixed.......................... | View details for APAR SE70631 |
Superseded by:...................... | View fix details for PTF SI77757 |
Recompile........................... | N |
Library............................. | QDNS |
MRI Feature ........................ | NONE |
Cum Level........................... | NONE |
IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.
Was this topic helpful?
Document Information
Modified date:
22 December 2021