Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
aports
aports
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 650
    • Issues 650
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 214
    • Merge Requests 214
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Analytics
    • Analytics
    • CI / CD
    • Repository
    • Value Stream
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • alpine
  • aportsaports
  • Issues
  • #10367

Closed
Open
Opened Apr 29, 2019 by Alicha CH@alichaReporter

[3.10] bind: Multiple vulnerabilities (CVE-2018-5743, CVE-2019-6467)

CVE-2018-5743: Limiting simultaneous TCP clients is ineffective

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for
most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contains an error which can be exploited to grow the number of simultaneous connections beyond this limit.

Affected Versions:

BIND 9.9.0 ->9.10.8-P1, 9.11.0 ->9.11.6, 9.12.0 ->9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5.
Versions 9.13.0 ->9.13.7 of the 9.13 development branch are also affected.

Fixed In Version:

bind 9.11.6-P1, bind 9.12.4-P1, bind 9.14.1

References:

https://kb.isc.org/docs/cve-2018-5743
https://www.openwall.com/lists/oss-security/2019/04/25/3

CVE-2019-6467: flaw in nxredirect can cause assertion failure

A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally.
The most likely scenario where this might occur is if the server, in addition to performing NXDOMAIN redirection for recursive clients, is also serving a local copy of the root zone or using mirroring
to provide the root zone, although other configurations are also possible.

Affected Versions:

BIND 9.12.0->9.12.4, 9.14.0. Also affects all releases in the 9.13 development branch.

Fixed In Version:

bind 9.12.4-P1, bind 9.14.1

References:

https://kb.isc.org/docs/cve-2019-6467
https://www.openwall.com/lists/oss-security/2019/04/25/3

(from redmine: issue id 10367, created on 2019-04-29, closed on 2019-05-03)

  • Relations:
    • parent #10366 (closed)
  • Changesets:
    • Revision 4a3cd5e6 by Chris Ely on 2019-04-30T12:38:37Z:
main/bind: security upgrade to 9.14.1

- CVE-2019-6467
- CVE-2018-5743

fixes #10367
To upload designs, you'll need to enable LFS and have admin enable hashed storage. More information
Assignee
Assign to
3.10.0
Milestone
3.10.0 (Past due)
Assign milestone
Time tracking
None
Due date
None
Reference: alpine/aports#10367