Red Hat Security Advisory 2019-2977-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A rate limiting issue has been addressed.
aac9f1dcb750c44cf956e00d95ceaecf229abcc3ebbfa69652b51810f094faea
Red Hat Security Advisory 2019-2698-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.
9191232f1de6658f5db8a114a7c144596828c7e42fbb70ab3ea50c562c14be36
Red Hat Security Advisory 2019-1492-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A connection rate limiting control vulnerability has been addressed.
2250a500dc8ba5389108b1c8a2caa2bc490fd36f31e61c6622861e9df085f568
Red Hat Security Advisory 2019-1294-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A rate limiting control is bind has been addressed.
00804d19c6027ea6b15b335ac6ef1890c2ac42d72398e97a5a536f4bdaf742ab
Red Hat Security Advisory 2019-1145-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include an ineffective connection limitation vulnerability.
7981dbb5b637c0d6404f4825b3fc714b68fe38d5cfc1840526b5bd5b6de36e4f
Debian Linux Security Advisory 4440-1 - Multiple vulnerabilities were found in the BIND DNS server.
f70a908b954d4b5ace79a2dea1e66f41bfc723be1ea3c500239d6be2254e57ad
Ubuntu Security Notice 3956-2 - USN-3956-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Bind incorrectly handled limiting the number of simultaneous TCP clients. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. Various other issues were also addressed.
92f0820e4e0b48968a72bf42560719fa484a428ac00b12eeca37d3daf694d334
Slackware Security Advisory - New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.
ea217cab2b85ff9222a103d60a3ecf77601ae00ad9c3ce3f302f6a3eacc53cba
Ubuntu Security Notice 3956-1 - It was discovered that Bind incorrectly handled limiting the number of simultaneous TCP clients. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service.
3d24ed0e149890bba90071f8a75a8241b8ac0de8924929c8af98c07861a6b0c0