MGASA-2018-0003

Source
https://advisories.mageia.org/MGASA-2018-0003.html
Import Source
https://advisories.mageia.org/MGASA-2018-0003.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0003
Related
Published
2018-01-01T01:17:34Z
Modified
2018-01-01T00:52:02Z
Summary
Updated ldns packages fix security vulnerabilities
Details

Stephan Zeisberg discovered that ldns incorrectly handled memory when processing data. A remote attacker could use this issue to cause ldns to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2017-1000231, CVE-2017-1000232).

References
Credits

Affected packages

Mageia:6 / ldns

Package

Name
ldns
Purl
pkg:rpm/mageia/ldns?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.17-8.1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / ldns

Package

Name
ldns
Purl
pkg:rpm/mageia/ldns?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.17-5.1.mga5

Ecosystem specific

{
    "section": "core"
}