Red Hat Security Advisory 2018-0487-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: bind: Improper fetch cleanup sequencing in the resolver can cause named to crash.
f0c1d5e1579f47905a00eabbb24dc6eb51db97b01c04238a99b10c7ada5c1692
Red Hat Security Advisory 2018-0488-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: bind: Improper fetch cleanup sequencing in the resolver can cause named to crash.
8ee9b9b0f8c41ef8b68e932e9a7be09a00f3a35126ebcde894fc19f52f0170bb
Red Hat Security Advisory 2018-0102-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request.
42467302e983da033be8f6a3260ca149adaf6a9d3514fe080d1a6022c64446b9
Red Hat Security Advisory 2018-0101-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request.
41a4a97a732661a75d9fdaf74edd3dd40714d6b040171fe8fc8abd3e9769405a
Slackware Security Advisory - New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
b01cd887f6d3b6900903b688eb5fefc894e09f2c99a2415411638b25be0e61b3
Ubuntu Security Notice 3535-2 - USN-3535-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM. Jayachandran Palanisamy discovered that the Bind resolver incorrectly handled fetch cleanup sequencing. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. Various other issues were also addressed.
fc2e2628b67be6d63e94406b27aba206b799baf71520b2c5c09b6a0aad5fffa0
Ubuntu Security Notice 3535-1 - Jayachandran Palanisamy discovered that the Bind resolver incorrectly handled fetch cleanup sequencing. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service.
51cbdd5000d09ef343d1f6641f1fe10c0de19873986000a48eb860679a3bbd68
Debian Linux Security Advisory 4089-1 - Jayachandran Palanisamy of Cygate AB reported that BIND, a DNS server implementation, was improperly sequencing cleanup operations, leading in some cases to a use-after-free error, triggering an assertion failure and crash in named.
0c69bcf7934d353be84dd3513394cfaf38689473248e38e85c9a036421992e79