MGASA-2015-0341

Source
https://advisories.mageia.org/MGASA-2015-0341.html
Import Source
https://advisories.mageia.org/MGASA-2015-0341.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0341
Related
Published
2015-09-08T07:20:40Z
Modified
2015-09-08T07:04:11Z
Summary
Updated bind packages fix security vulnerabilities
Details

Updated bind packages fix security vulnerability:

Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key (CVE-2015-5722).

An incorrect boundary check in openpgpkey_61.c can cause named to terminate due to a REQUIRE assertion failure. This defect can be deliberately exploited by an attacker who can provide a maliciously constructed response in answer to a query (CVE-2015-5986).

References
Credits

Affected packages

Mageia:4 / bind

Package

Name
bind
Purl
pkg:rpm/mageia/bind?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.9.7.P3-1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / bind

Package

Name
bind
Purl
pkg:rpm/mageia/bind?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.10.2.P4-1.mga5

Ecosystem specific

{
    "section": "core"
}