PTF Cover Letter
PTF ( Program Temporary Fixes ) Cover letter
OSP-DNS/Fix CVE-2021-25220 and CVE-2022-0396 for DNS bind
Pre/Co-Requisite PTF / Fix List
REQ LICENSED PTF/FIX LEVEL
TYPE PROGRAM RELEASE NUMBER MIN/MAX OPTION
---- -------- --------- ------- ------- ------
CO 5770SS1 V7R3M0 SI79382 NONE 0031
DIST 5733SC1 V7R2M0 SI70596 NONE 0001
NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels. This PTF may be a prerequisite
for future PTFs. By applying this PTF you authorize and agree to the
foregoing.
This PTF is subject to the terms of the license agreement which
accompanied, or was contained in, the Program for which you are obtaining
the PTF. You are not authorized to install or use the PTF except as part
of a Program for which you have a valid Proof of Entitlement.
SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.
The applicable license agreement may have been provided to you in printed
form and/or may be viewed using the Work with Software Agreements (WRKSFWAGR)
CL command.
APAR Error Description / Circumvention
-------------------------------------------------
ISC released CVE-2021-25220 and CVE-2022-0396.
CVE-2021-25220: When using forwarders, bogus NS records supplied
by, or via, those forwarders may be cached and used by named if
it needs to recurse for any reason, causing it to obtain and
pass on potentially incorrect answers.
CVE-2022-0396: Specifically crafted TCP streams can cause
connections to BIND to remain in CLOSE_WAIT status for an
indefinite period of time, even after the client has terminated
the connection.
CORRECTION FOR APAR 'SE77942' :
-------------------------------
Fixed the problems with the ISC-provided fixes.
CIRCUMVENTION FOR APAR 'SE77942' :
----------------------------------
None.
Activation Instructions
None.
Special Instructions
IF DNS SERVER IS NOT USED, THE PTF CAN BE IGNORED AND NO ACTION IS
REQUIRED. OTHERWISE, PLEASE SAVE DOMAIN NAME SERVER DATA UNDER
/QIBM/USERDATA/OS400/DNS AS A BACKUP BEFORE APPLYING THE PTF. AND THEN
FOLLOW THESE STEPS:
1. END ALL DOMAIN NAME SERVERS ON THE SYSTEM: ENDTCPSVR SERVER(*DNS)
DNSSVR(*ALL)
2. APPLY THE PTF
3. START ALL DOMAIN NAME SERVERS OR A SPECIFIED ONE: STRTCPSVR
SERVER(*DNS) DNSSVR(*ALL) OR STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)
DEPENDENCY: PASE AND RPM PACKAGES OPENSSL 1.1.1 AND LIBUV 1.42.0 OR
NEWER MUST BE INSTALLED BEFORE STARTING DNS SERVERS.
********************************************************************
THE FOLLOWING ARE SUPERSEDED SPECIAL INSTRUCTIONS. IF THE SUPERSEDED
PTF HAS ALREADY BEEN APPLIED AND ITS SPECIAL INSTRUCTION FOLLOWED,
IT IS NOT NECESSARY TO FOLLOW THAT SPECIAL INSTRUCTION AGAIN.
********************************************************************
SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI79383:
================================================
IF DNS SERVER IS NOT USED, THE PTF CAN BE IGNORED AND NO ACTION IS
REQUIRED. OTHERWISE, PLEASE SAVE DOMAIN NAME SERVER DATA UNDER
/QIBM/USERDATA/OS400/DNS AS A BACKUP BEFORE APPLYING THE PTF. AND THEN
FOLLOW THESE STEPS:
1. END ALL DOMAIN NAME SERVERS ON THE SYSTEM: ENDTCPSVR SERVER(*DNS)
DNSSVR(*ALL)
2. APPLY THE PTF
3. START ALL DOMAIN NAME SERVERS OR A SPECIFIED ONE: STRTCPSVR
SERVER(*DNS) DNSSVR(*ALL) OR STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)
DEPENDENCY: PASE AND RPM PACKAGES OPENSSL 1.1.1 AND LIBUV 1.42.0 OR
NEWER MUST BE INSTALLED BEFORE STARTING DNS SERVERS.
SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI70733 :
=================================================
IF DNS SERVER IS NOT USED, THE PTF CAN BE IGNORED AND NO ACTION IS
REQUIRED. OTHERWISE, PLEASE SAVE DOMAIN NAME SERVER DATA AS A BACKUP
BEFORE APPLYING THE PTF. AND THEN FOLLOW THESE STEPS:
1. END ALL DOMAIN NAME SERVERS ON THE SYSTEM: ENDTCPSVR SERVER(*DNS)
DNSSVR(*ALL)
2. APPLY THE PTF
3. START ALL DOMAIN NAME SERVERS OR A SPECIFIED ONE: STRTCPSVR
SERVER(*DNS) DNSSVR(*ALL) OR STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)
NOTE: OPENSSL 1.1.1 MUST BE AVAILABLE.
SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI68466 :
=================================================
IF DNS SERVER IS NOT USED, THE PTF CAN BE IGNORED AND NO ACTION IS
REQUIRED. OTHERWISE, PLEASE SAVE DOMAIN NAME SERVER DATA AS A BACKUP
BEFORE APPLYING THE PTF. AND THEN FOLLOW THESE STEPS:
1. END ALL DOMAIN NAME SERVERS ON THE SYSTEM: ENDTCPSVR SERVER(*DNS)
DNSSVR(*ALL)
2. APPLY THE PTF
3. START ALL DOMAIN NAME SERVERS OR A SPECIFIED ONE: STRTCPSVR
SERVER(*DNS) DNSSVR(*ALL) OR STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)
SPECIAL INSTRUCTIONS FOR SUPERSEDED PTF SI59086 :
=================================================
END DOMAIN NAME SERVERS ON THE SYSTEM
EXAMPLE: ENDTCPSVR SERVER(*DNS) DNSSVR(*ALL)
THEN APPLY THE PTF
START DOMAIN NAME SERVER AGAIN
EXAMPLE: STRTCPSVR SERVER(*DNS) DNSSVR(<DNS_NAME>)
Default Instructions
THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.
Supersedes
PTF/FIX NO(S). APAR TITLE LINE
-------------- ------------------------------------------------------------
SI79383 TCP-OTHER-UPGRADE DNS BIND TO BIND 9.16.
SI77753 OSP-DNS/FIX CVE-2021-25219
SI76269 OSP-DNS/FIX CVE-2021-25214 AND CVE-2021-25215
SI74160 OSP-DNS/FIX CVE-2020-8622 and CVE-2020-8624
SI73483 OSP-DNS/FIX CVE-2020-8616 AND CVE-2020-8617 FOR DNS BIND
SI70733 OSP-DNS/FIX CVE-2019-6471 FOR DNS BIND
SI69885 OSP-DNS/Fix CVE-2018-5743 for DNS bind
SI69119 OSP-DNS/Fix CVE-2018-5744, CVE-2018-5745 and CVE-2019-6465 f
SI68707 OSP-DNS/Fix CVE-2018-5741 for DNS bind
SI68466 OSP-DNS/Fix CVE-2018-5740 for DNS bind
SI66812 OSP-DNS/Fix CVE-2017-3145 for DNS bind
SI65336 OSP-DNS/Refresh DNS BIND to fix CVE-2017-3142 and CVE-2017-3
SI64614 OSP-DNS/Fix CVE-2017-3136 and CVE-2017-3137 for DNS bind
SI63767 OSP-DNS/Fix CVE-2016-9131, CVE-2016-9444 and CVE-2017-3135 f
SI62945 OSP-DNS/Fix CVE-2016-2775, CVE-2016-2776 and CVE-2016-8864 f
SI60386 OSP-DNS/Fix CVE-2016-1285, CVE-2016-1286 and CVE-2016-2088 f
SI59480 OSP-DNS/Fix CVE-2015-8704 and CVE-2015-8705 for DNS bind
SI59086 OSP-DNS/Fix CVE-2015-8000 for DNS bind
Summary Information
System.............................. i
Models..............................
Release............................. V7R3M0
Licensed Program.................... 5770SS1
APAR Fixed.......................... View details for APAR SE77942
Superseded by:...................... View fix details for PTF SI80438
Recompile........................... N
Library............................. QDNS
MRI Feature ........................ NONE
Cum Level........................... NONE
IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021, 2022 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.
Was this topic helpful?
Document Information
Modified date:
12 July 2022