bind9: CVE-2018-5744: A specially crafted packet can cause named to leak memory

Related Vulnerabilities: CVE-2018-5744   CVE-2018-5744  

Debian Bug report logs - #922953
bind9: CVE-2018-5744: A specially crafted packet can cause named to leak memory

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 22 Feb 2019 10:03:01 UTC

Severity: grave

Tags: security, upstream

Found in version bind9/1:9.11.5.P1+dfsg-2

Fixed in version bind9/1:9.11.5.P4+dfsg-1

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian DNS Team <team+dns@tracker.debian.org>:
Bug#922953; Package src:bind9. (Fri, 22 Feb 2019 10:03:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian DNS Team <team+dns@tracker.debian.org>. (Fri, 22 Feb 2019 10:03:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: bind9: CVE-2018-5744: A specially crafted packet can cause named to leak memory
Date: Fri, 22 Feb 2019 10:59:30 +0100
Source: bind9
Version: 1:9.11.5.P1+dfsg-2
Severity: grave
Tags: security
Justification: user security hole

Hi,

The following vulnerability was published for bind9.

CVE-2018-5744[0]:
A specially crafted packet can cause named to leak memory

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-5744
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5744
[1] https://kb.isc.org/docs/cve-2018-5744

Please adjust the affected versions in the BTS as needed, if I
researched correctly then for the 9.10 branch this was only introduced
in 9.10.7b1 and not affecting stretch.

Regards,
Salvatore



Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Fri, 22 Feb 2019 10:09:05 GMT) (full text, mbox, link).


Marked as fixed in versions bind9/1:9.11.5.P4+dfsg-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Fri, 22 Feb 2019 18:18:07 GMT) (full text, mbox, link).


Marked Bug as done Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Fri, 22 Feb 2019 18:18:08 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Fri, 22 Feb 2019 18:18:08 GMT) (full text, mbox, link).


Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#922953. (Fri, 22 Feb 2019 18:18:14 GMT) (full text, mbox, link).


Message #16 received at 922953-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 922953-submitter@bugs.debian.org, 922954-submitter@bugs.debian.org, 922955-submitter@bugs.debian.org
Subject: closing 922955, closing 922954, closing 922953
Date: Fri, 22 Feb 2019 19:14:21 +0100
close 922955 1:9.11.5.P4+dfsg-1
close 922954 1:9.11.5.P4+dfsg-1
close 922953 1:9.11.5.P4+dfsg-1
thanks

Close bugs accordingly as the fixes landed in the 1:9.11.5.P4+dfsg-1 version.




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 23 Mar 2019 07:28:18 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:49:37 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.