Gentoo Archives: gentoo-commits

From: "Kristian Fiskerstrand (k_f)" <k_f@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201502-03.xml
Date: Sat, 07 Feb 2015 16:07:09
Message-Id: 20150207160705.BB4171141C@oystercatcher.gentoo.org
1 k_f 15/02/07 16:07:05
2
3 Added: glsa-201502-03.xml
4 Log:
5 GLSA 201502-03
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-201502-03.xml
9
10 file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201502-03.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201502-03.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-201502-03.xml
14 ===================================================================
15 <?xml version="1.0" encoding="UTF-8"?>
16 <?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
17 <?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19 <glsa id="201502-03">
20 <title>BIND: Multiple Vulnerabilities </title>
21 <synopsis>Multiple vulnerabilities have been found in BIND, allowing remote
22 attackers to cause a
23 denial of service condition.
24 </synopsis>
25 <product type="ebuild">bind</product>
26 <announced>February 07, 2015</announced>
27 <revised>February 07, 2015: 1</revised>
28 <bug>531998</bug>
29 <access>remote</access>
30 <affected>
31 <package name="net-dns/bind" auto="yes" arch="*">
32 <unaffected range="ge">9.10.1_p1</unaffected>
33 <vulnerable range="lt">9.10.1_p1</vulnerable>
34 </package>
35 </affected>
36 <background>
37 <p>BIND (Berkeley Internet Name Domain) is a Name Server.</p>
38 </background>
39 <description>
40 <p>Multiple vulnerabilities have been discovered in BIND. Please review the
41 CVE identifiers referenced below for details.
42 </p>
43 </description>
44 <impact type="normal">
45 <p>A remote attacker can cause a denial of service condition by the lack of
46 GeoIP databases, or via a large or infinite number of referrals.
47 </p>
48 </impact>
49 <workaround>
50 <p>There is no known workaround at this time.</p>
51 </workaround>
52 <resolution>
53 <p>All bind users should upgrade to the latest version:</p>
54
55 <code>
56 # emerge --sync
57 # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.10.1_p1"
58 </code>
59
60 </resolution>
61 <references>
62 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3214">CVE-2014-3214</uri>
63 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8500">CVE-2014-8500</uri>
64 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8680">CVE-2014-8680</uri>
65 </references>
66 <metadata tag="requester" timestamp="Mon, 29 Dec 2014 00:38:51 +0000">
67 BlueKnight
68 </metadata>
69 <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 16:05:19 +0000">
70 BlueKnight
71 </metadata>
72 </glsa>