MGASA-2016-0030

Source
https://advisories.mageia.org/MGASA-2016-0030.html
Import Source
https://advisories.mageia.org/MGASA-2016-0030.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0030
Related
Published
2016-01-20T17:53:26Z
Modified
2016-01-20T17:43:24Z
Summary
Updated bind packages fix security vulnerability
Details

In ISC BIND before 9.10.3-P3, a buffer size check used to guard against overflow could cause named to exit with an INSIST failure In apl_42.c (CVE-2015-8704).

In ISC BIND before 9.10.3-P3, errors can occur when OPT pseudo-RR data or ECS options are formatted to text. In 9.10.3 through 9.10.3-P2, the issue may result in a REQUIRE assertion failure in buffer.c, causing a crash. This can be avoided in named by disabling debug logging (CVE-2015-8705).

References
Credits

Affected packages

Mageia:5 / bind

Package

Name
bind
Purl
pkg:rpm/mageia/bind?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.10.3.P3-1.mga5

Ecosystem specific

{
    "section": "core"
}