[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 285-1] bind9 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : bind9
Version        : 1:9.7.3.dfsg-1~squeeze16
CVE ID         : CVE-2015-5477

Jonathan Foote discovered that the BIND DNS server does not properly
handle TKEY queries. A remote attacker can take advantage of this flaw
to mount a denial of service via a specially crafted query triggering an
assertion failure and causing BIND to exit.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=uQbE
-----END PGP SIGNATURE-----


Reply to: