Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 3023-1] bind9 security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 3023-1] bind9 security update


Chronologisch Thread 
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 3023-1] bind9 security update
  • Date: Thu, 11 Sep 2014 20:39:20 +0000
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
  • Old-return-path: <carnil AT master.debian.org>
  • Priority: urgent
  • Resent-date: Thu, 11 Sep 2014 20:39:39 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <ACvFFIa-FZL.A.MH.LigEUB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3023-1 security AT debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : bind9
CVE ID : CVE-2014-0591
Debian Bug : 735190

Jared Mauch reported a denial of service flaw in the way BIND, a DNS
server, handled queries for NSEC3-signed zones. A remote attacker could
use this flaw against an authoritative name server that served
NCES3-signed zones by sending a specially crafted query, which, when
processed, would cause named to crash.

For the stable distribution (wheezy), this problem has been fixed in
version 1:9.8.4.dfsg.P1-6+nmu2+deb7u2.

For the testing distribution (jessie), this problem has been fixed in
version 1:9.9.5.dfsg-2.

For the unstable distribution (sid), this problem has been fixed in
version 1:9.9.5.dfsg-2.

We recommend that you upgrade your bind9 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJUEgg0AAoJEAVMuPMTQ89Ek7MQAJM/bZZZ2xbqIJDQZyh4SFnP
U+2D0wAXM45dwU4mK6W5vPWdONXyq8nKJyzcWxSptioVV4xKeGzBLEHwr+uZAMR/
skwlSTCPi67uo2u+Oh/hlzlyXp+/wv9Ymz2yXl5wLfUu7s1ZADlza30xiKoEjJxU
aCvoti8NAO3WGantqqdi/qBWCgopMQlpV/WSEWAtJijAiBOLRwe9jq1Hgepddz/e
ywiht8+PYT0346rkbBSGBiCDP+mVWII0z1X2JWzGybgH2MUrANrThzz5OCtAwcSk
eNSZvnQyoLMBiBpvu+/bi6dqxUY6Gw9uIk+MkbZXvQNHG/mYS7siKnAAf2/00DoZ
XMVziE022Ofi/xWDD7WySTQ5NKP472CrXXhfgAFjG6Q0sFofrVcVlEOGqdLLhk6f
HTPyN/MXatX9LcAeZ+4I/7RgwFCFotNySlbjgez6qnRctAAMKZO0ytdzaIEpLndW
EdsEmv+OpEzmfvo8x0kaU+1ruObVPFC/aPYhdkT33YngpLOuKASXBCbRdRE0gYYD
8J3XntD7vM9cT5VaiXNR3NX+LY1YPC/6vFRC/XX1BPWxbant4UdCdziYYNxmCuT7
pqCxk0YkBUVspkOpvwZzFpj41v7oudNxN6Nn6/9qyJlyW9M+4913c5yCAOzTWJxA
fumfQYANnivDth60kRG4
=DtiX
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: E1XSB9E-0004R6-CB AT master.debian.org">https://lists.debian.org/E1XSB9E-0004R6-CB AT master.debian.org




  • [IT-SecNots] [SECURITY] [DSA 3023-1] bind9 security update, Salvatore Bonaccorso, 11.09.2014

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang