I’ll have a patch for platforms without atomic support for you.

--
Ondřej Surý <ond...@sury.org>

> On 25 Apr 2019, at 08:49, Bernhard Schmidt <be...@debian.org> wrote:
> 
> Package: src:bind9
> Severity: grave
> Tags: security, upstream
> 
> CVE:                 CVE-2018-5743
> Document version:    2.0
> Posting date:        24 April 2019
> Program impacted:    BIND
> Versions affected:   BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6,
>                     9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview
>                     Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5.
>             Versions 9.13.0 -> 9.13.7 of the 9.13 development branch
>             are also affected. Versions prior to BIND 9.9.0 have not
>                     been evaluated for vulnerability to CVE-2018-5743.
> Severity:            High
> Exploitable:         Remotely
> 
> Description:
> 
>   By design, BIND is intended to limit the number of TCP clients
>   that can be connected at any given time. The number of allowed
>   connections is a tunable parameter which, if unset, defaults to
>   a conservative value for most servers. Unfortunately, the code
>   which was intended to limit the number of simultaneous connections
>   contains an error which can be exploited to grow the number of
>   simultaneous connections beyond this limit.
> 
> Impact:
> 
>   By exploiting the failure to limit simultaneous TCP connections,
>   an attacker can deliberately exhaust the pool of file descriptors
>   available to named, potentially affecting network connections
>   and the management of files such as log files or zone journal
>   files.
> 
>   In cases where the named process is not limited by OS-enforced
>   per-process limits, this could additionally potentially lead to
>   exhaustion of all available free file descriptors on that system.
> 
> CVSS Score:          7.5
> CVSS Vector:         CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
> 
> For more information on the Common Vulnerability Scoring System and
> to obtain your specific environmental score please visit:
> https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H.
> 
> Workarounds:
> 
>   None.
> 
> Active exploits:
> 
>   No known deliberate exploits, but the situation may occur
>   accidentally on busy servers.
> 
>   It is possible for operators to mistakenly believe that their
>   configured (or default) limit is sufficient for their typical
>   operations, when in fact it is not. Following an upgrade to a
>   version that effectively applies limits, named may deny connections
>   which were previously improperly permitted. Operators can monitor
>   their logs for rejected connections, keep an eye on "rndc status"
>   reports of simultaneous connections, or use other tools to monitor
>   whether the now-effective limits are causing problems for
>   legitimate clients. Should this be the case, increasing the value
>   of the tcp-clients setting in named.conf to an appropriate value
>   would be recommended.
> 
> Solution:
> 
>   Upgrade to a version of BIND containing a fix for the ineffective
>   limits.
> 
>   -  BIND 9.11.6-P1
>   -  BIND 9.12.4-P1
>   -  BIND 9.14.1
> 
>   BIND Supported Preview Edition is a special feature preview
>   branch of BIND provided to eligible ISC support customers.
> 
>   -  BIND 9.11.5-S6
>   -  BIND 9.11.6-S1
> 
> Acknowledgements:
> 
>   ISC would like to thank AT&T for helping us to discover this
>   issue.
> 
> Document revision history:
> 
>   1.0 Advance Notification, 16 January 2019
>   1.1 Recall due to error in original fix, 17 January 2019
>   1.3 Replacement fix delivered to Advance Notification customers, 15
> April 2019
>   1.4 Corrected Versions affected and Solution, 16 April 2019
>   1.5 Added reference to BIND 9.11.6-S1
>   2.0 Public disclosure, 24 April 2019
> 
> Related documents:
> 
>   See our BIND 9 Security Vulnerability Matrix for a complete
>   listing of security vulnerabilities and versions affected.
> 
> Do you still have questions? Questions regarding this advisory
> should go to security-offi...@isc.org. To report a new issue, please
> encrypt your message using security-offi...@isc.org's PGP key which
> can be found here:
>   https://www.isc.org/downloads/software-support-policy/openpgp-key
> If you are unable to use encrypted email, you may also report new
> issues at: https://www.isc.org/community/report-bug/.
> 
> Note:
> 
>   ISC patches only currently supported versions. When possible we
>   indicate EOL versions affected. (For current information on which
>   versions are actively supported, please see
>   https://www.isc.org/downloads/.)
> 
> ISC Security Vulnerability Disclosure Policy:
> 
>   Details of our current security advisory policy and practice can
>   be found in the ISC Software Defect and Security Vulnerability
>   Disclosure Policy.
> 
> Legal Disclaimer:
> 
>   Internet Systems Consortium (ISC) is providing this notice on
>   an "AS IS" basis. No warranty or guarantee of any kind is expressed
>   in this notice and none should be implied. ISC expressly excludes
>   and disclaims any warranties regarding this notice or materials
>   referred to in this notice, including, without limitation, any
>   implied warranty of merchantability, fitness for a particular
>   purpose, absence of hidden defects, or of non-infringement. Your
>   use or reliance on this notice or materials referred to in this
>   notice is at your own risk. ISC may change this notice at any
>   time. A stand-alone copy or paraphrase of the text of this
>   document that omits the document URL is an uncontrolled copy.
>   Uncontrolled copies may lack important information, be out of
>   date, or contain factual errors.
> 

Reply via email to