Security Fix(es):
* A denial of service flaw was found in the way BIND processed a response to an
ANY query. A remote attacker could use this flaw to make named exit unexpectedly
with an assertion failure via a specially crafted DNS response. (CVE-2016-9131)
* A denial of service flaw was found in the way BIND handled a query response
containing inconsistent DNSSEC information. A remote attacker could use this
flaw to make named exit unexpectedly with an assertion failure via a specially
crafted DNS response. (CVE-2016-9147)
* A denial of service flaw was found in the way BIND handled an unusually-formed
DS record response. A remote attacker could use this flaw to make named exit
unexpectedly with an assertion failure via a specially crafted DNS response.
(CVE-2016-9444)
https://rhn.redhat.com/errata/RHSA-2017-0062.html
BIND 9.9.4-RedHat-9.9.4-38.el7_3.1
* A denial of service flaw was found in the way BIND processed a response to an
ANY query. A remote attacker could use this flaw to make named exit unexpectedly
with an assertion failure via a specially crafted DNS response. (CVE-2016-9131)
* A denial of service flaw was found in the way BIND handled a query response
containing inconsistent DNSSEC information. A remote attacker could use this
flaw to make named exit unexpectedly with an assertion failure via a specially
crafted DNS response. (CVE-2016-9147)
* A denial of service flaw was found in the way BIND handled an unusually-formed
DS record response. A remote attacker could use this flaw to make named exit
unexpectedly with an assertion failure via a specially crafted DNS response.
(CVE-2016-9444)
https://rhn.redhat.com/errata/RHSA-2017-0062.html
BIND 9.9.4-RedHat-9.9.4-38.el7_3.1