CVE-2016-2848: A packet with malformed options can trigger an assertion failure in ISC BIND versions
This document (7018170) is provided subject to the disclaimer at the end of this document.
SUSE Linux Enterprise Server 10 Service Pack 3 (SLES 10 SP3)
Current ISC versions of BIND are safe from this vulnerability, but repackaged versions distributed by other parties may be vulnerable if they were forked from ISC's source before change #3548.
All version of SUSE Linux Enterprise Server version that are currently under maintenance and LTSS are not affected by this vulnerability.
The vulnerability described in this security advisory was corrected by bug fixes which occurred during the normal course of BIND development and release versions of BIND published by ISC have been safe against this vulnerability since May 2013.
However, versions which were released prior to that date, including some versions which have been used as the basis for installable packages by operating system vendors who maintain their own BIND versions, may be vulnerable.
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:7018170
- Creation Date: 19-Oct-2016
- Modified Date:03-Mar-2020
- SUSE Linux Enterprise Server
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com