SB2018011921 - Fedora 26 update for bind, bind-dyndb-ldap, dnsperf



SB2018011921 - Fedora 26 update for bind, bind-dyndb-ldap, dnsperf

Published: January 19, 2018 Updated: April 24, 2025

Security Bulletin ID SB2018011921
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use-after-free error (CVE-ID: CVE-2017-3145)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper sequencing cleanup operations on upstream recursion fetch contexts. A remote attacker can trigger use-after-free error that may lead to assertion failure and cause the BIND name server (named) process to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.