ALAS2-2018-954 --- bindID: oval:org.secpod.oval:def:1700009 | Date: (C)2018-02-23 (M)2023-12-20 |
Class: PATCH | Family: unix |
Improper fetch cleanup sequencing in the resolver can cause named to crashA use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request