Univention Bugzilla – Full Text Bug Listing |
Summary: | bind9: Denial of service (4.1) | ||
---|---|---|---|
Product: | UCS | Reporter: | Arvid Requate <requate> |
Component: | Security updates | Assignee: | Arvid Requate <requate> |
Status: | CLOSED FIXED | QA Contact: | Jürn Brodersen <brodersen> |
Severity: | normal | ||
Priority: | P5 | CC: | gohmann |
Version: | UCS 4.1 | Flags: | requate:
Patch_Available+
|
Target Milestone: | UCS 4.1-5-errata | ||
Hardware: | Other | ||
OS: | Linux | ||
What kind of report is it?: | Security Issue | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | Security | |
Max CVSS v3 score: | 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | ||
Bug Depends on: | 42747 | ||
Bug Blocks: |
Description
Arvid Requate
2017-03-09 14:05:45 CET
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u16 fixes * An error handling synthesized records could cause an assertion failure when using DNS64 with "break-dnssec yes;" (CVE-2017-3136) * A response packet can cause a resolver to terminate when processing an answer containing a CNAME or DNAME (CVE-2017-3137) * named exits with a REQUIRE assertion failure if it receives a null command string on its control channel (CVE-2017-3138) Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u17 fixes: * An error in TSIG authentication can permit unauthorized zone transfers (CVE-2017-3142) * An error in TSIG authentication can permit unauthorized dynamic updates (CVE-2017-3143) And 1:9.8.4.dfsg.P1-6+nmu2+deb7u18 fixes a regression. Upstream package imported and built. Advisory: bind9.yaml OK bind works with and without samba after the upgrade -> OK YAML -> OK -> Verified |