ALT-PU-2015-1773-1
Closed vulnerabilities
BDU:2015-12237
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00941
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00942
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2013-2266
libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://linux.oracle.com/errata/ELSA-2014-1244
- APPLE-SA-2013-09-12-1
- APPLE-SA-2013-09-12-1
- FEDORA-2013-4525
- FEDORA-2013-4525
- FEDORA-2013-4533
- FEDORA-2013-4533
- HPSBUX02876
- HPSBUX02876
- SSRT101148
- SSRT101148
- RHSA-2013:0689
- RHSA-2013:0689
- RHSA-2013:0690
- RHSA-2013:0690
- http://support.apple.com/kb/HT5880
- http://support.apple.com/kb/HT5880
- DSA-2656
- DSA-2656
- http://www.isc.org/software/bind/advisories/cve-2013-2266
- http://www.isc.org/software/bind/advisories/cve-2013-2266
- 58736
- 58736
- USN-1783-1
- USN-1783-1
- https://kb.isc.org/article/AA-00871/
- https://kb.isc.org/article/AA-00871/
- https://kb.isc.org/article/AA-00879/
- https://kb.isc.org/article/AA-00879/
- oval:org.mitre.oval:def:19579
- oval:org.mitre.oval:def:19579
Modified: 2024-11-21
CVE-2013-3919
resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.
Modified: 2024-11-21
CVE-2013-4854
The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
- 20130806 [slackware-security] bind (SSA:2013-218-01)
- 20130806 [slackware-security] bind (SSA:2013-218-01)
- APPLE-SA-2014-10-16-3
- APPLE-SA-2014-10-16-3
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://linux.oracle.com/errata/ELSA-2014-1244
- FEDORA-2013-13863
- FEDORA-2013-13863
- FEDORA-2013-13831
- FEDORA-2013-13831
- SUSE-SU-2013:1310
- SUSE-SU-2013:1310
- openSUSE-SU-2013:1354
- openSUSE-SU-2013:1354
- RHSA-2013:1114
- RHSA-2013:1114
- RHSA-2013:1115
- RHSA-2013:1115
- 54134
- 54134
- 54185
- 54185
- 54207
- 54207
- 54211
- 54211
- 54323
- 54323
- 54432
- 54432
- DSA-2728
- DSA-2728
- FreeBSD-SA-13:07
- FreeBSD-SA-13:07
- MDVSA-2013:202
- MDVSA-2013:202
- 61479
- 61479
- 1028838
- 1028838
- USN-1910-1
- USN-1910-1
- http://www.zerodayinitiative.com/advisories/ZDI-13-210/
- http://www.zerodayinitiative.com/advisories/ZDI-13-210/
- isc-bind-cve20134854-dos(86004)
- isc-bind-cve20134854-dos(86004)
- HPSBUX02926
- HPSBUX02926
- SSRT101281
- SSRT101281
- https://kb.isc.org/article/AA-01015
- https://kb.isc.org/article/AA-01015
- https://kb.isc.org/article/AA-01016
- https://kb.isc.org/article/AA-01016
- https://kc.mcafee.com/corporate/index?page=content&id=SB10052
- https://kc.mcafee.com/corporate/index?page=content&id=SB10052
- oval:org.mitre.oval:def:19561
- oval:org.mitre.oval:def:19561
- https://support.apple.com/kb/HT6536
- https://support.apple.com/kb/HT6536
Modified: 2024-11-21
CVE-2013-6230
The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask.
Modified: 2024-11-21
CVE-2014-8500
ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- NetBSD-SA2015-002
- NetBSD-SA2015-002
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- APPLE-SA-2015-09-16-4
- APPLE-SA-2015-09-16-4
- SUSE-SU-2015:0011
- SUSE-SU-2015:0011
- SUSE-SU-2015:0096
- SUSE-SU-2015:0096
- SUSE-SU-2015:0480
- SUSE-SU-2015:0480
- SUSE-SU-2015:0488
- SUSE-SU-2015:0488
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03235
- HPSBUX03235
- SSRT101750
- SSRT101750
- HPSBUX03400
- HPSBUX03400
- SSRT102211
- SSRT102211
- RHSA-2016:0078
- RHSA-2016:0078
- 62064
- 62064
- 62122
- 62122
- GLSA-201502-03
- GLSA-201502-03
- 1031311
- 1031311
- USN-2437-1
- USN-2437-1
- DSA-3094
- DSA-3094
- VU#264212
- VU#264212
- MDVSA-2015:165
- MDVSA-2015:165
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 71590
- 71590
- https://kb.isc.org/article/AA-01216/
- https://kb.isc.org/article/AA-01216/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://support.apple.com/HT205219
- https://support.apple.com/HT205219
Modified: 2024-11-21
CVE-2015-1349
named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
- http://advisories.mageia.org/MGASA-2015-0082.html
- http://advisories.mageia.org/MGASA-2015-0082.html
- APPLE-SA-2015-09-16-4
- APPLE-SA-2015-09-16-4
- FEDORA-2015-2543
- FEDORA-2015-2543
- FEDORA-2015-2548
- FEDORA-2015-2548
- SUSE-SU-2015:1205
- SUSE-SU-2015:1205
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03379
- HPSBUX03379
- SSRT101976
- SSRT101976
- RHSA-2015:0672
- RHSA-2015:0672
- MDVSA-2015:054
- MDVSA-2015:054
- MDVSA-2015:165
- MDVSA-2015:165
- USN-2503-1
- USN-2503-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://kb.isc.org/article/AA-01235
- https://kb.isc.org/article/AA-01235
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- GLSA-201510-01
- GLSA-201510-01
- https://support.apple.com/HT205219
- https://support.apple.com/HT205219
Modified: 2024-11-21
CVE-2015-4620
name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
- FEDORA-2015-11483
- FEDORA-2015-11483
- FEDORA-2015-11484
- FEDORA-2015-11484
- SUSE-SU-2015:1205
- SUSE-SU-2015:1205
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03379
- HPSBUX03379
- SSRT101976
- SSRT101976
- RHSA-2015:1443
- RHSA-2015:1443
- RHSA-2015:1471
- RHSA-2015:1471
- DSA-3304
- DSA-3304
- 75588
- 75588
- 1032799
- 1032799
- USN-2669-1
- USN-2669-1
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- GLSA-201510-01
- GLSA-201510-01
- https://security.netapp.com/advisory/ntap-20190903-0003/
- https://security.netapp.com/advisory/ntap-20190903-0003/
Modified: 2024-11-21
CVE-2015-5477
named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- FEDORA-2015-12335
- FEDORA-2015-12335
- FEDORA-2015-12357
- FEDORA-2015-12357
- FEDORA-2015-12316
- FEDORA-2015-12316
- SUSE-SU-2015:1304
- SUSE-SU-2015:1304
- SUSE-SU-2015:1305
- SUSE-SU-2015:1305
- SUSE-SU-2015:1316
- SUSE-SU-2015:1316
- SUSE-SU-2015:1322
- SUSE-SU-2015:1322
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1335
- openSUSE-SU-2015:1335
- SUSE-SU-2016:0227
- SUSE-SU-2016:0227
- HPSBUX03400
- HPSBUX03400
- SSRT102211
- SSRT102211
- HPSBUX03410
- HPSBUX03410
- SSRT102175
- SSRT102175
- HPSBOV03506
- HPSBOV03506
- HPSBUX03511
- HPSBUX03511
- SSRT102248
- SSRT102248
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- RHSA-2015:1513
- RHSA-2015:1513
- RHSA-2015:1514
- RHSA-2015:1514
- RHSA-2015:1515
- RHSA-2015:1515
- RHSA-2016:0078
- RHSA-2016:0078
- RHSA-2016:0079
- RHSA-2016:0079
- DSA-3319
- DSA-3319
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 76092
- 76092
- 1033100
- 1033100
- USN-2693-1
- USN-2693-1
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- GLSA-201510-01
- GLSA-201510-01
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://support.apple.com/kb/HT205032
- https://support.apple.com/kb/HT205032
- 37721
- 37721
- 37723
- 37723
Modified: 2024-11-21
CVE-2015-8000
db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
- FEDORA-2015-40882ddfb1
- FEDORA-2015-40882ddfb1
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-2df40de264
- FEDORA-2015-2df40de264
- FEDORA-2015-e278e12ebc
- FEDORA-2015-e278e12ebc
- SUSE-SU-2015:2340
- SUSE-SU-2015:2340
- SUSE-SU-2015:2341
- SUSE-SU-2015:2341
- SUSE-SU-2015:2359
- SUSE-SU-2015:2359
- openSUSE-SU-2015:2364
- openSUSE-SU-2015:2364
- openSUSE-SU-2015:2365
- openSUSE-SU-2015:2365
- openSUSE-SU-2015:2391
- openSUSE-SU-2015:2391
- SUSE-SU-2016:0227
- SUSE-SU-2016:0227
- HPSBUX03552
- HPSBUX03552
- SSRT102983
- SSRT102983
- http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html
- http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html
- RHSA-2015:2655
- RHSA-2015:2655
- RHSA-2015:2656
- RHSA-2015:2656
- RHSA-2015:2658
- RHSA-2015:2658
- RHSA-2016:0078
- RHSA-2016:0078
- RHSA-2016:0079
- RHSA-2016:0079
- DSA-3420
- DSA-3420
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 79349
- 79349
- 1034418
- 1034418
- SSA:2015-349-01
- SSA:2015-349-01
- USN-2837-1
- USN-2837-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105
- https://kb.isc.org/article/AA-01317
- https://kb.isc.org/article/AA-01317
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
Modified: 2024-11-21
CVE-2015-8461
Race condition in resolver.c in named in ISC BIND 9.9.8 before 9.9.8-P2 and 9.10.3 before 9.10.3-P2 allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via unspecified vectors.
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-2df40de264
- FEDORA-2015-2df40de264
- 79347
- 79347
- 1034419
- 1034419
- SSA:2015-349-01
- SSA:2015-349-01
- https://kb.isc.org/article/AA-01319
- https://kb.isc.org/article/AA-01319
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
Modified: 2024-11-21
CVE-2016-1285
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
- FEDORA-2016-364c0a9df4
- FEDORA-2016-364c0a9df4
- FEDORA-2016-161b73fc2c
- FEDORA-2016-161b73fc2c
- FEDORA-2016-b593e84223
- FEDORA-2016-b593e84223
- FEDORA-2016-5047abe4a9
- FEDORA-2016-5047abe4a9
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-dce6dbe6a8
- FEDORA-2016-dce6dbe6a8
- SUSE-SU-2016:0759
- SUSE-SU-2016:0759
- SUSE-SU-2016:0780
- SUSE-SU-2016:0780
- SUSE-SU-2016:0825
- SUSE-SU-2016:0825
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0859
- openSUSE-SU-2016:0859
- SUSE-SU-2016:1541
- SUSE-SU-2016:1541
- HPSBUX03583
- HPSBUX03583
- SSRT110084
- SSRT110084
- RHSA-2016:0562
- RHSA-2016:0562
- RHSA-2016:0601
- RHSA-2016:0601
- DSA-3511
- DSA-3511
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 1035236
- 1035236
- USN-2925-1
- USN-2925-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://kb.isc.org/article/AA-01352
- https://kb.isc.org/article/AA-01352
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:13
- FreeBSD-SA-16:13
- GLSA-201610-07
- GLSA-201610-07
Modified: 2024-11-21
CVE-2016-1286
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
- FEDORA-2016-364c0a9df4
- FEDORA-2016-364c0a9df4
- FEDORA-2016-161b73fc2c
- FEDORA-2016-161b73fc2c
- FEDORA-2016-b593e84223
- FEDORA-2016-b593e84223
- FEDORA-2016-5047abe4a9
- FEDORA-2016-5047abe4a9
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-dce6dbe6a8
- FEDORA-2016-dce6dbe6a8
- SUSE-SU-2016:0759
- SUSE-SU-2016:0759
- SUSE-SU-2016:0780
- SUSE-SU-2016:0780
- SUSE-SU-2016:0825
- SUSE-SU-2016:0825
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0859
- openSUSE-SU-2016:0859
- SUSE-SU-2016:1541
- SUSE-SU-2016:1541
- HPSBUX03583
- HPSBUX03583
- SSRT110084
- SSRT110084
- RHSA-2016:0562
- RHSA-2016:0562
- RHSA-2016:0601
- RHSA-2016:0601
- DSA-3511
- DSA-3511
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 1035237
- 1035237
- USN-2925-1
- USN-2925-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://kb.isc.org/article/AA-01353
- https://kb.isc.org/article/AA-01353
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:13
- FreeBSD-SA-16:13
- GLSA-201610-07
- GLSA-201610-07
Modified: 2024-11-21
CVE-2017-3135
Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.
- RHSA-2017:0276
- RHSA-2017:0276
- 96150
- 96150
- 1037801
- 1037801
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://kb.isc.org/docs/aa-01453
- https://kb.isc.org/docs/aa-01453
- GLSA-201708-01
- GLSA-201708-01
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://security.netapp.com/advisory/ntap-20180926-0005/
- DSA-3795
- DSA-3795
Closed bugs
bind: Необходимо обеспечить совместимость службы с systemd
[DNS Amplification Attacks] Включить поддержку DNS RRL (доступно, начиная с 9.9.4 и 9.10.x)
Обновить до версии из Сизифа (9.9.7-alt2)