lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <8739m3eqdx.fsf@mid.deneb.enyo.de> Date: Thu, 31 Mar 2011 08:49:14 +0200 From: Florian Weimer <fw@...eb.enyo.de> To: debian-security-announce@...ts.debian.org Subject: [SECURITY] [DSA 2208-2] bind9 security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2208-2 security@...ian.org http://www.debian.org/security/ Florian Weimer March 30, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : bind9 Vulnerability : denial of service Problem type : remote Debian-specific: no The BIND, a DNS server, contains a defect related to the processing of new DNSSEC DS records by the caching resolver, which may lead to name resolution failures in the delegated zone. If DNSSEC validation is enabled, this issue can make domains ending in .COM unavailable when the DS record for .COM is added to the DNS root zone on March 31st, 2011. An unpatched server which is affected by this issue can be restarted, thus re-enabling resolution of .COM domains. Configurations not using DNSSEC validations are not affected by this usse. For the oldstable distribution (lenny), this problem has been fixed in version 1:9.6.ESV.R4+dfsg-0+lenny1. We recommend that you upgrade your bind9 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org - -- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@...ts.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@...ts.debian.org Archive: http://lists.debian.org/87bp0scsya.fsf@mid.deneb.enyo.de -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJNlCcnAAoJEL97/wQC1SS+NVAH/jkfZPJgSuuD1e7oBdzZk/ay FXf3cYbcpCqoynmaE8O9ws/4fBvh9SuAezY+Gjq9+aN2gIWfxg6Oa2c3QRYXkOyy Nqm1SkHNQRoxwl424iuytjY9Bzu7yCDPbwRVp5FLbraGTWFPiSInOaP6ll8XQstp 72fqFN03/RoovZs3clBjtIlloCTUBG9uEYVllvgweYpjo833DSeuuS3bxAC8veqz efBvFFS5k6v8c0uMyBHlb8YJWqwd31rFbJefjnlznocceFiCnIxWZifF/jVmachq R7JAhIoL9XR11W3K8pPEYWDiLlnjGEzKRGIQZzPvAY8hOQ/SDcClAmNpvo+MtHo= =Teal -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists