MGASA-2015-0481

Source
https://advisories.mageia.org/MGASA-2015-0481.html
Import Source
https://advisories.mageia.org/MGASA-2015-0481.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0481
Related
Published
2015-12-20T09:15:38Z
Modified
2015-12-21T20:44:36Z
Summary
Updated bind packages fix security vulnerability
Details

An error in the parsing of incoming responses allows some records with an incorrect class to be accepted by BIND instead of being rejected as malformed. This can trigger a REQUIRE assertion failure when those records are subsequently cached. Intentional exploitation of this condition is possible and could be used as a denial-of-service vector against servers performing recursive queries (CVE-2015-8000).

References
Credits

Affected packages

Mageia:5 / bind

Package

Name
bind
Purl
pkg:rpm/mageia/bind?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.10.3.P2-1.mga5

Ecosystem specific

{
    "section": "core"
}