Skip to Content.
Sympa Menu

discuss - [opennic-discuss] Fwd: [SECURITY] [DSA 3763-1] pdns-recursor security update

discuss AT

Subject: Discuss mailing list

List archive

[opennic-discuss] Fwd: [SECURITY] [DSA 3763-1] pdns-recursor security update

Chronological Thread 
  • From: Fusl Dash <opennic AT>
  • To: "discuss AT" <discuss AT>
  • Subject: [opennic-discuss] Fwd: [SECURITY] [DSA 3763-1] pdns-recursor security update
  • Date: Fri, 13 Jan 2017 18:29:20 +0100

-------- Forwarded Message --------
Subject: [SECURITY] [DSA 3763-1] pdns-recursor security update
Resent-Date: Fri, 13 Jan 2017 16:31:17 +0000 (UTC)
Resent-From: debian-security-announce AT
Date: Fri, 13 Jan 2017 16:31:00 +0000
From: Salvatore Bonaccorso <carnil AT>
Reply-To: debian-security-announce-request AT
To: debian-security-announce AT

Debian Security Advisory DSA-3763-1 security AT Salvatore Bonaccorso
January 13, 2017

Package : pdns-recursor
CVE ID : CVE-2016-7068

Florian Heinz and Martin Kluge reported that pdns-recursor, a recursive
DNS server, parses all records present in a query regardless of whether
they are needed or even legitimate, allowing a remote, unauthenticated
attacker to cause an abnormal CPU usage load on the pdns server,
resulting in a partial denial of service if the system becomes

For the stable distribution (jessie), this problem has been fixed in
version 3.6.2-2+deb8u3.

We recommend that you upgrade your pdns-recursor packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:

Mailing list: debian-security-announce AT

Attachment: signature.asc
Description: OpenPGP digital signature

  • [opennic-discuss] Fwd: [SECURITY] [DSA 3763-1] pdns-recursor security update, Fusl Dash, 01/13/2017

Archive powered by MHonArc 2.6.19.

Top of Page