Univention Bugzilla – Bug 39544
bind9: Denial of service (3.2)
Last modified: 2016-10-06 19:16:00 CEST
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u7 fixes this issue: * incorrect validation of DNSSEC-signed records in the Bind DNS server could result in denial of service (CVE-2015-5722) +++ This bug was initially created as a clone of Bug #37247 +++
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u8 fixes this issue: * Responses with a malformed class attribute can trigger an assertion failure in db.c (CVE-2015-8000)
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u9 fixes this issue: * Denial of service due to INSIST failure in apl_42.c triggered by specific APL RR data (CVE-2015-8704)
Upstream Debian package version 1:9.8.4.dfsg.P1-6+nmu2+deb7u10 fixes these issues: * Denial of service due to maliciously crafted rdnc command (CVE-2016-1285) * Denial of service (crash) due to DNAME parsing error (CVE-2016-1286)
Ticket#2016061421000591 $ repo_admin.py -U -p bind9 -d wheezy -r 3.2 -s errata3.2-8 Package: bind9 Version: 1:9.8.4.dfsg.P1-6+nmu2.120.201607011019 Branch: ucs_3.2-0 Scope: errata3.2-8 r70758 | Bug #39544, Bug #29977: bind9 YAML 3.2-8 bind9.yaml
Tests / upgrade with Samba 4 backend: OK Tests / upgrade with OpenLDAP backend: OK YAML: OK Build log: OK
<http://errata.software-univention.de/ucs/3.2/440.html>