[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 672-1] bind9 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : bind9
Version        : 1:9.8.4.dfsg.P1-6+nmu2+deb7u12
CVE ID         : CVE-2016-2848


CVE-2016-2848
     A server vulnerable to this defect can be forced to
     exit with an assertion failure if it receives a malformed packet.
     Authoritative and recursive servers are both vulnerable.


For Debian 7 "Wheezy", these problems have been fixed in version
1:9.8.4.dfsg.P1-6+nmu2+deb7u12.

We recommend that you upgrade your bind9 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=sikq
-----END PGP SIGNATURE-----


Reply to: