MGASA-2015-0272

Source
https://advisories.mageia.org/MGASA-2015-0272.html
Import Source
https://advisories.mageia.org/MGASA-2015-0272.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0272
Related
Published
2015-07-09T08:09:20Z
Modified
2015-07-09T07:58:10Z
Summary
Updated bind package fixes security vulnerability
Details

A recursive resolver that is performing DNSSEC validation can be deliberately terminated by any attacker who can cause a query to be performed against a maliciously constructed zone. This will result in a denial of service to clients who rely on that resolver (CVE-2015-4620).

Note that DNSSEC validation is not enabled by default.

References
Credits

Affected packages

Mageia:4 / bind

Package

Name
bind
Purl
pkg:rpm/mageia/bind?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.9.7.P1-1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / bind

Package

Name
bind
Purl
pkg:rpm/mageia/bind?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.10.2.P2-1.mga5

Ecosystem specific

{
    "section": "core"
}