ALAS-2018-954ID: oval:org.secpod.oval:def:1600842 | Date: (C)2018-03-01 (M)2023-06-28 |
Class: PATCH | Family: unix |
Improper fetch cleanup sequencing in the resolver can cause named to crash:A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request.
Platform: |
Amazon Linux AMI |