[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 3304-1] bind9 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3304-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
July 07, 2015                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : bind9
CVE ID         : CVE-2015-4620

Breno Silveira Soares of Servico Federal de Processamento de Dados
(SERPRO) discovered that the BIND DNS server is prone to a denial of
service vulnerability. A remote attacker who can cause a validating
resolver to query a zone containing specifically constructed contents
can cause the resolver to terminate with an assertion failure, resulting
in a denial of service to clients relying on the resolver.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1:9.8.4.dfsg.P1-6+nmu2+deb7u5.

For the stable distribution (jessie), this problem has been fixed in
version 1:9.9.5.dfsg-9+deb8u1.

For the testing distribution (stretch) and the unstable distribution
(sid), this problem will be fixed soon.

We recommend that you upgrade your bind9 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=UeRx
-----END PGP SIGNATURE-----


Reply to: