|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0107 (bind)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0107: Updated bind packages fix security vulnerability
Date:  Fri, 11 Mar 2016 00:38:11 +0100
Message-ID:  <20160310233811.153D49F699@duvel.mageia.org>

MGASA-2016-0107 - Updated bind packages fix security vulnerability Publication date: 10 Mar 2016 URL: http://advisories.mageia.org/MGASA-2016-0107.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-1285, CVE-2016-1286, CVE-2016-2088 Description: In ISC BIND before 9.10.3-P4, an error parsing input received by the rndc control channel can cause an assertion failure in sexpr.c or alist.c (CVE-2016-1285). In ISC BIND before 9.10.3-P4, a problem parsing resource record signatures for DNAME resource records can lead to an assertion failure in resolver.c or db.c (CVE-2016-1286). In ISC BIND before 9.10.3-P4, A response containing multiple DNS cookies causes servers with cookie support enabled to exit with an assertion failure in resolver.c (CVE-2016-2088). References: - https://bugs.mageia.org/show_bug.cgi?id=17935 - https://kb.isc.org/article/AA-01351 - https://kb.isc.org/article/AA-01352 - https://kb.isc.org/article/AA-01353 - https://kb.isc.org/article/AA-01363 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2088 SRPMS: - 5/core/bind-9.10.3.P4-1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds