Debian Security Advisory
DSA-3511-1 bind9 -- security update
- Date Reported:
- 09 Mar 2016
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2016-1285, CVE-2016-1286.
- More information:
Two vulnerabilites have been discovered in ISC's BIND DNS server.
A maliciously crafted rdnc, a way to remotely administer a BIND server, operation can cause named to crash, resulting in denial of service.
An error parsing DNAME resource records can cause named to crash, resulting in denial of service.
For the oldstable distribution (wheezy), these problems have been fixed in version 1:9.8.4.dfsg.P1-6+nmu2+deb7u10.
For the stable distribution (jessie), these problems have been fixed in version 1:9.9.5.dfsg-9+deb8u6.
For the testing (stretch) and unstable (sid) distributions, these problems will be fixed soon.
We recommend that you upgrade your bind9 packages.