Red Hat Security Advisory 2021-0922-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
8f485aa85fb6da6a34c44a31a5ebdbb4b58fb4157c9e76afe2fd756b840b2b7a
Red Hat Security Advisory 2021-0727-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
24592df75cea3cdf3fda328953d6f7f1658da79c31c8eb0232a522f7bf1f3473
Red Hat Security Advisory 2021-0691-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
99c97bd55ebcf7b3b44170c0c91880cdba7fd6d905eb567662a806a37ce73a45
Ubuntu Security Notice 4737-2 - USN-4737-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Bind incorrectly handled GSSAPI security policy negotiation. A remote attacker could use this issue to cause Bind to crash, resulting in a denial of service, or possibly execute arbitrary code. In the default installation, attackers would be isolated by the Bind AppArmor profile. Various other issues were also addressed.
8a0e368b8840f8ec1b3b94248a1d45882762a7bc660dba12302673a0e7e0bc90
Red Hat Security Advisory 2021-0692-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
6f615f341c71255a07f8e345e489427436f905a55452ab1d0ed8ac365c63f6c9
Red Hat Security Advisory 2021-0693-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
768623d83ec6a6362792f51d8d8887db9d1877ec4c289fd656b96d33b2f1c4a7
Red Hat Security Advisory 2021-0694-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
fb77b712176bdaca91d761260c2d81c3a0a227f363b94396d229f1fd080caada
Red Hat Security Advisory 2021-0671-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
1d23c4e4f2758de7aaa84c8dba3edacae62fd96882dd870d90605511073800e1
Red Hat Security Advisory 2021-0672-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
b7f20f6de38f3b42806b6f5cda045c86a233bccd35d0412cd67cd3e3f57460a4
Red Hat Security Advisory 2021-0670-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
d2eb04c5f1d2aa8e6342acc20bf9360a544ec363b28ca2175836a4f2414177ee
Red Hat Security Advisory 2021-0669-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.
67e663a58b935ad770a30ce931e227cdbfa6bbb0b523b99932fbe9e9f065ffa4
Debian Linux Security Advisory 4857-1 - A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code.
0d5f699225d63d98310a1b39eec5904606fd5c723c4bc622c2e54f1635238966
Ubuntu Security Notice 4737-1 - It was discovered that Bind incorrectly handled GSSAPI security policy negotiation. A remote attacker could use this issue to cause Bind to crash, resulting in a denial of service, or possibly execute arbitrary code. In the default installation, attackers would be isolated by the Bind AppArmor profile.
2bf46e97a6f3775a141176519c2d8406ecea005a42e0a840999b0f44e8d85446