Back to bug 1385450

Who When What Removed Added
Dhiru Kholia 2016-10-17 05:02:43 UTC CC security-response-team
Dhiru Kholia 2016-10-17 05:02:55 UTC Blocks 1383236
Dhiru Kholia 2016-10-17 05:06:41 UTC CC dkholia
Dhiru Kholia 2016-10-17 05:11:47 UTC Depends On 1385452
Dhiru Kholia 2016-10-17 05:12:14 UTC Depends On 1385453
Dhiru Kholia 2016-10-17 05:12:21 UTC Depends On 1385454
Dhiru Kholia 2016-10-17 05:18:30 UTC Depends On 1385455
Adam Mariš 2016-10-17 16:18:37 UTC CC amaris, fweimer
Dhiru Kholia 2016-10-18 05:13:06 UTC Doc Text A denial of service flaw was found in the way BIND handled a packet with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet.
Doc Type If docs needed, set a value Bug Fix
Tomáš Hozza 2016-10-18 14:13:36 UTC Doc Text A denial of service flaw was found in the way BIND handled a packet with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. If this bug requires documentation, please select an appropriate Doc Type value.
Dhiru Kholia 2016-10-19 08:23:44 UTC Doc Text If this bug requires documentation, please select an appropriate Doc Type value. A denial of service flaw was found in the way BIND handled a packet with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet.
Tomas Hoger 2016-10-19 08:33:00 UTC Doc Text A denial of service flaw was found in the way BIND handled a packet with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet.
Dhiru Kholia 2016-10-19 08:37:05 UTC Whiteboard impact=important,public=20161020,reported=20160928,source=internet,cvss2=5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-617,rhel-4/bind=wontfix,rhel-5/bind=affected,rhel-5/bind97=affected,rhel-6/bind=affected,rhel-7/bind=notaffected,fedora-all/bind=notaffected,fedora-all/bind99=notaffected impact=important,public=20161020,reported=20160928,source=internet,cvss2=5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-617,rhel-4/bind=wontfix,rhel-5/bind=affected,rhel-5/bind97=affected,rhel-6/bind=affected,rhel-6.2.z/bind=affected,rhel-6.4.z/bind=affected,rhel-6.5.z/bind=affected,rhel-6.6.z/bind=affected,rhel-6.7.z/bind=affected,rhel-7/bind=notaffected,fedora-all/bind=notaffected,fedora-all/bind99=notaffected
Dhiru Kholia 2016-10-19 08:56:28 UTC Depends On 1386548
Dhiru Kholia 2016-10-19 08:56:38 UTC Depends On 1386549
Dhiru Kholia 2016-10-19 08:56:50 UTC Depends On 1386550
Dhiru Kholia 2016-10-19 08:56:59 UTC Depends On 1386551
Dhiru Kholia 2016-10-19 08:57:10 UTC Depends On 1386552
Tomas Hoger 2016-10-20 18:19:58 UTC Group security, qe_staff
Summary EMBARGOED CVE-2016-2848 bind: assertion failure triggered by a packet with malformed options CVE-2016-2848 bind: assertion failure triggered by a packet with malformed options
Dhiru Kholia 2016-10-25 10:42:43 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2016-10-25 06:42:43 UTC
Adam Mariš 2016-11-08 15:54:27 UTC CC amaris
Product Security DevOps Team 2019-09-29 13:57:57 UTC Whiteboard impact=important,public=20161020,reported=20160928,source=internet,cvss2=5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P,cvss3=7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,cwe=CWE-617,rhel-4/bind=wontfix,rhel-5/bind=affected,rhel-5/bind97=affected,rhel-6/bind=affected,rhel-6.2.z/bind=affected,rhel-6.4.z/bind=affected,rhel-6.5.z/bind=affected,rhel-6.6.z/bind=affected,rhel-6.7.z/bind=affected,rhel-7/bind=notaffected,fedora-all/bind=notaffected,fedora-all/bind99=notaffected

Back to bug 1385450