<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for bind</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1532-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-06-10T09:31:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-06-10T09:31:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-06-10T09:31:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for bind</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)

This update was imported from the SUSE:SLE-12-SP1:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1532-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="bind-9.9.9P1-56.1">
      <FullProductName ProductID="bind-9.9.9P1-56.1">bind-9.9.9P1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-chrootenv-9.9.9P1-56.1">
      <FullProductName ProductID="bind-chrootenv-9.9.9P1-56.1">bind-chrootenv-9.9.9P1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-devel-9.9.9P1-56.1">
      <FullProductName ProductID="bind-devel-9.9.9P1-56.1">bind-devel-9.9.9P1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-doc-9.9.9P1-56.1">
      <FullProductName ProductID="bind-doc-9.9.9P1-56.1">bind-doc-9.9.9P1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-libs-9.9.9P1-56.1">
      <FullProductName ProductID="bind-libs-9.9.9P1-56.1">bind-libs-9.9.9P1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-libs-32bit-9.9.9P1-56.1">
      <FullProductName ProductID="bind-libs-32bit-9.9.9P1-56.1">bind-libs-32bit-9.9.9P1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-lwresd-9.9.9P1-56.1">
      <FullProductName ProductID="bind-lwresd-9.9.9P1-56.1">bind-lwresd-9.9.9P1-56.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bind-utils-9.9.9P1-56.1">
      <FullProductName ProductID="bind-utils-9.9.9P1-56.1">bind-utils-9.9.9P1-56.1</FullProductName>
    </Branch>
    <Relationship ProductReference="bind-9.9.9P1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:bind-9.9.9P1-56.1">bind-9.9.9P1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-chrootenv-9.9.9P1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:bind-chrootenv-9.9.9P1-56.1">bind-chrootenv-9.9.9P1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-devel-9.9.9P1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:bind-devel-9.9.9P1-56.1">bind-devel-9.9.9P1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-doc-9.9.9P1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:bind-doc-9.9.9P1-56.1">bind-doc-9.9.9P1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-libs-9.9.9P1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:bind-libs-9.9.9P1-56.1">bind-libs-9.9.9P1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-libs-32bit-9.9.9P1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:bind-libs-32bit-9.9.9P1-56.1">bind-libs-32bit-9.9.9P1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-lwresd-9.9.9P1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:bind-lwresd-9.9.9P1-56.1">bind-lwresd-9.9.9P1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bind-utils-9.9.9P1-56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:bind-utils-9.9.9P1-56.1">bind-utils-9.9.9P1-56.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">"deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0-&gt;9.8.8, 9.9.0-&gt;9.9.13, 9.10.0-&gt;9.10.8, 9.11.0-&gt;9.11.4, 9.12.0-&gt;9.12.2, 9.13.0-&gt;9.13.2.</Note>
    </Notes>
    <CVE>CVE-2018-5740</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:bind-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-chrootenv-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-devel-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-doc-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-libs-32bit-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-libs-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-lwresd-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-utils-9.9.9P1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5740.html</URL>
        <Description>CVE-2018-5740</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104129</URL>
        <Description>SUSE Bug 1104129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148887</URL>
        <Description>SUSE Bug 1148887</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.6, 9.12.0 -&gt; 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -&gt; 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -&gt; 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.</Note>
    </Notes>
    <CVE>CVE-2018-5743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:bind-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-chrootenv-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-devel-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-doc-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-libs-32bit-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-libs-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-lwresd-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-utils-9.9.9P1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5743.html</URL>
        <Description>CVE-2018-5743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133185</URL>
        <Description>SUSE Bug 1133185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148887</URL>
        <Description>SUSE Bug 1148887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157051</URL>
        <Description>SUSE Bug 1157051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P1, 9.12.0 -&gt; 9.12.3-P1, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.</Note>
    </Notes>
    <CVE>CVE-2018-5745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:bind-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-chrootenv-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-devel-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-doc-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-libs-32bit-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-libs-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-lwresd-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-utils-9.9.9P1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5745.html</URL>
        <Description>CVE-2018-5745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126068</URL>
        <Description>SUSE Bug 1126068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148887</URL>
        <Description>SUSE Bug 1148887</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P2, 9.12.0 -&gt; 9.12.3-P2, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.</Note>
    </Notes>
    <CVE>CVE-2019-6465</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:bind-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-chrootenv-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-devel-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-doc-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-libs-32bit-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-libs-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-lwresd-9.9.9P1-56.1</ProductID>
        <ProductID>openSUSE Leap 42.3:bind-utils-9.9.9P1-56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6465.html</URL>
        <Description>CVE-2019-6465</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126069</URL>
        <Description>SUSE Bug 1126069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148887</URL>
        <Description>SUSE Bug 1148887</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
