[SECURITY] [DLA 672-1] bind9 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : bind9
Version : 1:9.8.4.dfsg.P1-6+nmu2+deb7u12
CVE ID : CVE-2016-2848
CVE-2016-2848
A server vulnerable to this defect can be forced to
exit with an assertion failure if it receives a malformed packet.
Authoritative and recursive servers are both vulnerable.
For Debian 7 "Wheezy", these problems have been fixed in version
1:9.8.4.dfsg.P1-6+nmu2+deb7u12.
We recommend that you upgrade your bind9 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=sikq
-----END PGP SIGNATURE-----
Reply to: