Hide Forgot
A flaw was found in Bind. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure causing denial of service.
External References: https://kb.isc.org/docs/cve-2018-5745
Created bind tracking bugs for this issue: Affects: fedora-all [bug 1679925] Created bind99 tracking bugs for this issue: Affects: fedora-all [bug 1679926]
Upstream advisory notes the following versions as being affected by this issue: 9.9.0 -> 9.10.8-P1 9.11.0 -> 9.11.5-P1 9.12.0 -> 9.12.3-P1 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition 9.13.0 -> 9.13.6 of the 9.13 development branch versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745
Acknowledgments: Name: ISC
Upstream patch: https://gitlab.isc.org/isc-projects/bind9/commit/f09352d20a9d360e50683cd1d2fc52ccedcd77a0 https://gitlab.isc.org/isc-projects/bind9/commit/38c2bdba0a5b785ef9f2da2329838b931754b3e4 https://gitlab.isc.org/isc-projects/bind9/commit/235a64a5a4c0143b183bd55f6ed756741d4d7880 https://gitlab.isc.org/isc-projects/bind9/commit/e7c12bffb
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3552 https://access.redhat.com/errata/RHSA-2019:3552
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-5745
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1061 https://access.redhat.com/errata/RHSA-2020:1061