Univention Bugzilla – Bug 42747
bind9: Denial of service (4.1)
Last modified: 2017-03-09 14:05:45 CET
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u12 fixes this issue: * ISC BIND 9.1.0 through 9.8.4-P2 and 9.9.0 through 9.9.2-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via malformed options data in an OPT resource record. (CVE-2016-2848)
Advisory: bind9.yaml
OK: aptitude install '?source-package(bind9)~i' OK: aptitude install '?source-package(bind9)' OK: dig @127.0.0.1 -p 53 "$(dnsdomainname)" axfr OK: named-checkconf /etc/bind/named.conf.samba4 OK: ucr set dns/backend=ldap OK: dig @127.0.0.1 -p 7777 "$(dnsdomainname)" axfr OK: named-checkconf /etc/bind/named.conf.proxy OK: named-checkconf /etc/bind/named.conf OK: zless /usr/share/doc/bind9/changelog.Debian.gz # 1:9.8.4.dfsg.P1-6+nmu2+deb7u13 FIXED: errata-announce -V --only bind9.yaml # r74792 FIXED: misses CVE-2016-8864 # r74808
*** Bug 42898 has been marked as a duplicate of this bug. ***
<http://errata.software-univention.de/ucs/4.1/336.html>