Vulnerability Details : CVE-2016-1286
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
Vulnerability category: Denial of service
Products affected by CVE-2016-1286
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
- cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
- cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.8:p3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.8:-:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:-:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:beta1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d15:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d70:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d65:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d76:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d25:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d66:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d75:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48:d51:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d71:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d77:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d67:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d73:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49:d180:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46:d72:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s12:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s13:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s13:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46-d10:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46-d76:-:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Threat overview for CVE-2016-1286
Top countries where our scanners detected CVE-2016-1286
Top open port discovered on systems with this issue
53
IPs affected by CVE-2016-1286 297,230
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-1286!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-1286
70.97%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1286
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
8.6
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
3.9
|
4.0
|
NIST | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
3.9
|
4.0
|
NIST |
References for CVE-2016-1286
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html
[security-announce] SUSE-SU-2016:1541-1: important: Security update forMailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2925-1
USN-2925-1: Bind vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://security.gentoo.org/glsa/201610-07
BIND: Multiple vulnerabilities (GLSA 201610-07) — Gentoo securityThird Party Advisory
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
HPSBUX03583 SSRT110084 rev.1 - HP-UX BIND Service running Named, Remote Denial of Service (DoS)Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html
[security-announce] SUSE-SU-2016:0780-1: important: Security update forMailing List;Third Party Advisory
-
https://kb.isc.org/article/AA-01380
404 Page not foundRelease Notes;Vendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html
[SECURITY] Fedora 24 Update: bind-9.10.3-12.P4.fc24Third Party Advisory
-
https://kb.isc.org/article/AA-01353
CVE-2016-1286: A problem parsing resource record signatures for DNAME resource records can lead to an assertion failure in resolver.c or db.c - Affecting Only Obsolete BranchesVendor Advisory
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html
[security-announce] openSUSE-SU-2016:0834-1: important: Security updateThird Party Advisory
-
https://kb.isc.org/article/AA-01438
404 Page not foundBroken Link;Vendor Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Oracle Solaris Bulletin - April 2016Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-0562.html
RHSA-2016:0562 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html
[security-announce] SUSE-SU-2016:0759-1: important: Security update forMailing List;Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3511
Debian -- Security Information -- DSA-3511-1 bind9Third Party Advisory
-
http://marc.info/?l=bugtraq&m=146191105921542&w=2
'[security bulletin] HPSBUX03583 SSRT110084 rev.1 - HP-UX BIND Service running Named, Remote Denial o' - MARCIssue Tracking;Third Party Advisory
-
http://www.securitytracker.com/id/1035237
BIND Resource Record Signature Parsing Bug Lets Remote Users Cause the Target Service to Crash - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html
[security-announce] openSUSE-SU-2016:0859-1: important: Security updateThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Oracle Linux Bulletin - January 2016Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html
[SECURITY] Fedora 24 Update: bind99-9.9.8-4.P4.fc24Mailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html
[SECURITY] Fedora 22 Update: bind-9.10.3-9.P4.fc22Mailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html
[SECURITY] Fedora 23 Update: bind99-9.9.8-4.P4.fc23Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html
[security-announce] openSUSE-SU-2016:0830-1: important: Security updateThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html
[security-announce] openSUSE-SU-2016:0827-1: important: Security updateMailing List;Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Oracle VM Server for x86 Bulletin - July 2016Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html
[security-announce] SUSE-SU-2016:0825-1: important: Security update forMailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html
[SECURITY] Fedora 23 Update: bind-9.10.3-12.P4.fc23Mailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html
[SECURITY] Fedora 22 Update: bind99-9.9.8-4.P4.fc22Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-0601.html
RHSA-2016:0601 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to