{"id":"MGASA-2015-0272","summary":"Updated bind package fixes security vulnerability","details":"A recursive resolver that is performing DNSSEC validation can be\ndeliberately terminated by any attacker who can cause a query to be\nperformed against a maliciously constructed zone.  This will result in a\ndenial of service to clients who rely on that resolver (CVE-2015-4620).\n\nNote that DNSSEC validation is not enabled by default.\n","modified":"2026-02-02T09:52:21.152708Z","published":"2015-07-09T08:09:20Z","related":["CVE-2015-4620"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0272.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=16324"},{"type":"REPORT","url":"https://kb.isc.org/article/AA-01267"},{"type":"REPORT","url":"https://kb.isc.org/article/AA-01270"},{"type":"REPORT","url":"https://kb.isc.org/article/AA-01269"}],"affected":[{"package":{"name":"bind","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/bind?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.9.7.P1-1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0272.json"}},{"package":{"name":"bind","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/bind?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.10.2.P2-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0272.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}