dns-operations AT lists.opennicproject.org
Subject: Dns-operations mailing list
List archive
- From: Fusl Dash <opennic AT lists.dedilink.eu>
- To: dns-operations AT lists.opennicproject.org
- Subject: [opennic-dns-operations] Fwd: [SECURITY] [DSA 3319-1] bind9 security update
- Date: Sat, 1 Aug 2015 18:01:01 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi!
Just wanted to let everyone know about this (especially those not having
updated their bind9 server yet). Please read the announcement below.
Best regards
Fusl - root AT meo.ws - http://meo.ws/
- -------- Forwarded Message --------
Subject: [SECURITY] [DSA 3319-1] bind9 security update
Resent-Date: Tue, 28 Jul 2015 19:05:25 +0000 (UTC)
Resent-From: debian-security-announce AT lists.debian.org
Date: Tue, 28 Jul 2015 19:05:08 +0000
From: Salvatore Bonaccorso <carnil AT debian.org>
Reply-To: debian-security AT lists.debian.org
To: debian-security-announce AT lists.debian.org
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3319-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 28, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : bind9
CVE ID : CVE-2015-5477
Jonathan Foote discovered that the BIND DNS server does not properly
handle TKEY queries. A remote attacker can take advantage of this flaw
to mount a denial of service via a specially crafted query triggering an
assertion failure and causing BIND to exit.
For the oldstable distribution (wheezy), this problem has been fixed
in version 1:9.8.4.dfsg.P1-6+nmu2+deb7u6.
For the stable distribution (jessie), this problem has been fixed in
version 1:9.9.5.dfsg-9+deb8u2.
We recommend that you upgrade your bind9 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
- --
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: https://lists.debian.org/E1ZKABY-0007ej-0d AT master.debian.org
- --
Best regards
Fusl - root AT meo.ws - http://meo.ws/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBAgAGBQJVvO09AAoJELAaqP3QtzpMOVYIAJPqFwMJpbwA0sbD/kx5/Tzi
P7brGNl7MoME6/mQGKbXLLBfE3DdKXiE0sBILR7y8+OTxCTn6p3Fm3OocgPaRbAa
7gicR+AOLZQonLIqTrgIwia9ueiGKpGqC892c8oovGw663wCAcBuV+s3IqvUNuI2
eNZN/A8f/RYkgyNJ99A9RMv6JmrKsQY8kaUv2kSysknTNoNxoN9aQ107RsHVhoZl
nUZyLkJv88R1rBXsw3qavJqqi7uD6IWpmVKmf//ZEfk5BH3HocWNGRYobc/sww6s
eNv+yioLHQIpcy+PJ2xytl3FN51osQeGEUcA+0zLZLv8wzeh1uvnj2EqyD+A9lo=
=GifE
-----END PGP SIGNATURE-----
- [opennic-dns-operations] Fwd: [SECURITY] [DSA 3319-1] bind9 security update, Fusl Dash, 08/01/2015
Archive powered by MHonArc 2.6.19.