Linux Security
Linux Security
Linux Security

Debian: DSA-3758-1: bind9 security update

Date 11 Jan 2017
169
Posted By LinuxSecurity Advisories
Several denial-of-service vulnerabilities (assertion failures) were discovered in BIND, a DNS server implementation. CVE-2016-9131
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3758-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/                           Florian Weimer
January 11, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : bind9
CVE ID         : CVE-2016-9131 CVE-2016-9147 CVE-2016-9444
Debian Bug     : 851062 851063 851065

Several denial-of-service vulnerabilities (assertion failures) were
discovered in BIND, a DNS server implementation.

CVE-2016-9131

    A crafted upstream response to an ANY query could cause an
    assertion failure.

CVE-2016-9147

    A crafted upstream response with self-contradicting DNSSEC data
    could cause an assertion failure.

CVE-2016-9444

    Specially-crafted upstream responses with a DS record could cause
    an assertion failure.

These vulnerabilities predominantly affect DNS servers providing
recursive service.  Client queries to authoritative-only servers
cannot trigger these assertion failures.  These vulnerabilities are
present whether or not DNSSEC validation is enabled in the server
configuration.

For the stable distribution (jessie), these problems have been fixed in
version 1:9.9.5.dfsg-9+deb8u9.

We recommend that you upgrade your bind9 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

Advisories

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"47","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.86,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.47,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.