Gentoo Linux Security Advisory 201708-1 - Multiple vulnerabilities have been found in BIND, the worst of which allows remote attackers to cause a Denial of Service condition. Versions less than 9.11.1_p1 are affected.
26ecec5b9c39723c91713f534c2bfcfc46f59790162df2b1e8c128e88b83f604
Red Hat Security Advisory 2017-1583-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
e9b9a042180a214847e5dfb74e6d32ab0f667bf43a23874c8dba389ebd9a427a
Red Hat Security Advisory 2017-0064-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
e2774344dae73a0082a496340632584a7a1d9c4a4591d03c5f96328c0f8f865d
Red Hat Security Advisory 2017-0063-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
cc6588ac4b7cda54c1d714072e8765446eb3d641719134a4fc00057919ddd9df
Red Hat Security Advisory 2017-0062-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND processed a response to an ANY query. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
d0a6d68d832b96a099701144e523f5f2713f65a35db5c6b5d584358317eb20c7
Ubuntu Security Notice 3172-1 - It was discovered that Bind incorrectly handled certain malformed responses to an ANY query. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. It was discovered that Bind incorrectly handled certain malformed responses to an ANY query. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. It was discovered that Bind incorrectly handled certain malformed DS record responses. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. Various other issues were also addressed.
58c88f10fc8dc7a5397e2e121f5226f25b58d9ff176839ad1ae0624464692314
Debian Linux Security Advisory 3758-1 - Several denial-of-service vulnerabilities (assertion failures) were discovered in BIND, a DNS server implementation.
3829c8365faeb2e9468ba3e528a71716e2884ebd1d5192cbc1b518876007a5ee