CVE-2017-3145

Priority
Description
BIND was improperly sequencing cleanup operations on upstream recursion
fetch contexts, leading in some cases to a use-after-free error that can
trigger an assertion failure and crash in named. Affects BIND 9.0.0 to
9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to
9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
Assigned-to
mdeslaur
Notes
Package
Source: bind9 (LP Ubuntu Debian)
Upstream:released (9.9.11-P1,9.10.6-P1,9.11.2-P1)
Ubuntu 12.04 ESM (Precise Pangolin):released (1:9.8.1.dfsg.P1-4ubuntu0.24)
Ubuntu 14.04 ESM (Trusty Tahr):released (1:9.9.5.dfsg-3ubuntu0.17)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:9.10.3.dfsg.P4-8ubuntu1.10)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1:9.11.2.P1-1ubuntu3)
More Information

Updated: 2020-09-10 05:39:15 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)