{"affected":[{"ecosystem_specific":{"binaries":[{"bind-devel":"9.11.2-12.11.2","bind-utils":"9.11.2-12.11.2","libbind9-160":"9.11.2-12.11.2","libdns169":"9.11.2-12.11.2","libirs-devel":"9.11.2-12.11.2","libirs160":"9.11.2-12.11.2","libisc166":"9.11.2-12.11.2","libisccc160":"9.11.2-12.11.2","libisccfg160":"9.11.2-12.11.2","liblwres160":"9.11.2-12.11.2","python3-bind":"9.11.2-12.11.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.2-12.11.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"bind-devel":"9.11.2-12.11.2","bind-utils":"9.11.2-12.11.2","libbind9-160":"9.11.2-12.11.2","libdns169":"9.11.2-12.11.2","libirs-devel":"9.11.2-12.11.2","libirs160":"9.11.2-12.11.2","libisc166":"9.11.2-12.11.2","libisccc160":"9.11.2-12.11.2","libisccfg160":"9.11.2-12.11.2","liblwres160":"9.11.2-12.11.2","python3-bind":"9.11.2-12.11.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP1","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.2-12.11.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"bind":"9.11.2-12.11.2","bind-chrootenv":"9.11.2-12.11.2","bind-doc":"9.11.2-12.11.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.2-12.11.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"bind":"9.11.2-12.11.2","bind-chrootenv":"9.11.2-12.11.2","bind-doc":"9.11.2-12.11.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP1","name":"bind","purl":"pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.11.2-12.11.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for bind fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).\n- CVE-2018-5745: Fixed a denial of service vulnerability if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (bsc#1126068).\n- CVE-2018-5743: Fixed a denial of service vulnerability which could be caused by to many simultaneous TCP connections (bsc#1133185).\n- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).\n","id":"SUSE-SU-2019:1407-1","modified":"2019-06-03T11:34:09Z","published":"2019-06-03T11:34:09Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20191407-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1104129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1126068"},{"type":"REPORT","url":"https://bugzilla.suse.com/1126069"},{"type":"REPORT","url":"https://bugzilla.suse.com/1133185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5740"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-5745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-6465"}],"related":["CVE-2018-5740","CVE-2018-5743","CVE-2018-5745","CVE-2019-6465"],"summary":"Security update for bind","upstream":["CVE-2018-5740","CVE-2018-5743","CVE-2018-5745","CVE-2019-6465"]}