{"id":"MGASA-2021-0560","summary":"Updated bind packages fix security vulnerability","details":"Updated bind packages fix security vulnerability:\n\nKishore Kumar Kothapalli discovered that the lame server cache in BIND,\na DNS server implementation, can be abused by an attacker to significantly\ndegrade resolver performance, resulting in denial of service (large delays\nfor responses for client queries and DNS timeouts on client hosts)\n(CVE-2021-25219).\n","modified":"2026-02-02T06:58:51.758269Z","published":"2021-12-19T12:26:08Z","related":["CVE-2021-25219"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0560.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29427"},{"type":"REPORT","url":"https://kb.isc.org/docs/cve-2021-25219"},{"type":"REPORT","url":"https://www.debian.org/security/2021/dsa-4994"}],"affected":[{"package":{"name":"bind","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/bind?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.11.36-1.1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0560.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}