- Security update 9.10.3-P3:
* CVE-2016-1285, bsc#970072: assert failure on input parsing can cause premature exit. * CVE-2016-1286, bsc#970073: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. * CVE-2016-2088, bsc#970074: a deliberately misconstructed packet containing multiple cookie options to cause named to terminate with an assertion failure. OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=190
This commit is contained in:
parent
abbe73be65
commit
2d8afe69b8
15
bind.changes
15
bind.changes
@ -1,10 +1,15 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 13:53:26 UTC 2016 - max@suse.com
|
||||
Fri Mar 11 13:56:10 UTC 2016 - max@suse.com
|
||||
|
||||
- Security update 9.10.3-P3 fixes two assertion failures that can
|
||||
lead to remote DoS:
|
||||
* CVE-2016-1285, bsc#970072
|
||||
* CVE-2016-1286, bsc#970073
|
||||
- Security update 9.10.3-P3:
|
||||
* CVE-2016-1285, bsc#970072: assert failure on input parsing can
|
||||
cause premature exit.
|
||||
* CVE-2016-1286, bsc#970073: An error when parsing signature
|
||||
records for DNAME can lead to named exiting due to an assertion
|
||||
failure.
|
||||
* CVE-2016-2088, bsc#970074: a deliberately misconstructed packet
|
||||
containing multiple cookie options to cause named to terminate
|
||||
with an assertion failure.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 25 16:10:45 UTC 2016 - bwiedemann@suse.com
|
||||
|
Loading…
Reference in New Issue
Block a user