discuss AT lists.opennicproject.org
Subject: Discuss mailing list
List archive
- From: Fusl Dash <opennic AT lists.dedilink.eu>
- To: "discuss AT lists.opennicproject.org" <discuss AT lists.opennicproject.org>
- Subject: [opennic-discuss] Fwd: [SECURITY] [DSA 3763-1] pdns-recursor security update
- Date: Fri, 13 Jan 2017 18:29:20 +0100
-------- Forwarded Message --------
Subject: [SECURITY] [DSA 3763-1] pdns-recursor security update
Resent-Date: Fri, 13 Jan 2017 16:31:17 +0000 (UTC)
Resent-From: debian-security-announce AT lists.debian.org
Date: Fri, 13 Jan 2017 16:31:00 +0000
From: Salvatore Bonaccorso <carnil AT debian.org>
Reply-To: debian-security-announce-request AT lists.debian.org
To: debian-security-announce AT lists.debian.org
-------------------------------------------------------------------------
Debian Security Advisory DSA-3763-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 13, 2017 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : pdns-recursor
CVE ID : CVE-2016-7068
Florian Heinz and Martin Kluge reported that pdns-recursor, a recursive
DNS server, parses all records present in a query regardless of whether
they are needed or even legitimate, allowing a remote, unauthenticated
attacker to cause an abnormal CPU usage load on the pdns server,
resulting in a partial denial of service if the system becomes
overloaded.
For the stable distribution (jessie), this problem has been fixed in
version 3.6.2-2+deb8u3.
We recommend that you upgrade your pdns-recursor packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
Attachment:
signature.asc
Description: OpenPGP digital signature
- [opennic-discuss] Fwd: [SECURITY] [DSA 3763-1] pdns-recursor security update, Fusl Dash, 01/13/2017
Archive powered by MHonArc 2.6.19.