HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running BIND. The vulnerability could be exploited remotely to create a Denial of Service (DoS) and permit unauthorized disclosure of information.
bd8b17704deb1ab7649c91532d1c94ef776dd4816a7809ba4ddc9d701b153d10
Debian Linux Security Advisory 2054-2 - This update restores the PID file location for bind to the location before the last security update. Several cache-poisoning vulnerabilities have been discovered in BIND. These vulnerabilities are apply only if DNSSEC validation is enabled and trust anchors have been installed, which is not the default.
641008a7bc8797a719b9c5b286467557338f36a004d245409d2fafcdeac55ac7
Debian Linux Security Advisory 2054-1 - Several cache-poisoning vulnerabilities have been discovered in BIND. These vulnerabilities are apply only if DNSSEC validation is enabled and trust anchors have been installed, which is not the default.
3f735c4833aeac702aa70117b4ee33364894fa1b8bd7021809591297abc6b061
Gentoo Linux Security Advisory 201006-11 - Several cache poisoning vulnerabilities have been found in BIND. Multiple cache poisoning vulnerabilities were discovered in BIND. Versions less than 9.4.3_p5 are affected.
e8507ae0312f6e16b9fc87551331eaa59be119931581a9defa718586c4ca5f8f