Univention Bugzilla – Bug 39543
bind9: Denial of service (4.0)
Last modified: 2019-04-11 19:25:01 CEST
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u7 fixes this issue: * incorrect validation of DNSSEC-signed records in the Bind DNS server could result in denial of service (CVE-2015-5722) +++ This bug was initially created as a clone of Bug #39058 +++
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u8 fixes this issue: * Responses with a malformed class attribute can trigger an assertion failure in db.c (CVE-2015-8000)
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u9 fixes this issue: * Denial of service due to INSIST failure in apl_42.c triggered by specific APL RR data (CVE-2015-8704)
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u10 fixes these issues: * Denial of service due to maliciously crafted rdnc command (CVE-2016-1285) * Denial of service (crash) due to DNAME parsing error (CVE-2016-1286)
UCS 4.0 is out of maintenance. See Depends field for the UCS 4.1 specific bug.