lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20150902214712.GA3882@pisco.westfalen.local>
Date: Wed, 2 Sep 2015 23:47:12 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3350-1] bind9 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3350-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 02, 2015                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : bind9
CVE ID         : CVE-2015-5722

Hanno Boeck discovered that incorrect validation of DNSSEC-signed records
in the Bind DNS server could result in denial of service.

Updates for the oldstable distribution (wheezy) will be released shortly.

For the stable distribution (jessie), this problem has been fixed in
version 9.9.5.dfsg-9+deb8u3.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your bind9 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ae/2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ