[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 4994-1] bind9 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4994-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
October 28, 2021                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : bind9
CVE ID         : CVE-2021-25219

Kishore Kumar Kothapalli discovered that the lame server cache in BIND,
a DNS server implementation, can be abused by an attacker to
significantly degrade resolver performance, resulting in denial of
service (large delays for responses for client queries and DNS timeouts
on client hosts).

For the oldstable distribution (buster), this problem has been fixed
in version 1:9.11.5.P4+dfsg-5.1+deb10u6.

For the stable distribution (bullseye), this problem has been fixed in
version 1:9.16.22-1~deb11u1.

We recommend that you upgrade your bind9 packages.

For the detailed security status of bind9 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/bind9

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmF7B69fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0SW8A/9Eb6aJcW3wekH5ncpTvOnPBrkv4qyzz8+DeVWEZA+z8fIKkrgmOyBjclG
piNtTJUZsFNp7n0FSPtId7AiXsSSDz6xMOSsyHfHEdDrQ/BD+rYJC7VtBRBzdZbD
eXKmMyPg0zz2KFeQ1Bkk6JeL/9BQ1+I+Th9peo1PLfWxCCbzXyzRwxHsktHaKf2q
VbYEFobEzB9TAWW6Z5yC2zJjHTe+816HiHc6s7U8xtTLyfjfu3qmEZf1unFja8Po
+UWNiuqI3bdeuzKeJ2ByRj46RkPM3pekrAO4bjS6Xp4QxXe9n+IJ37tm3CgXSl86
ukBIzA5JYlI53KyHANZOAM4MRSxVCQjU+dbE/KikZEE/F2jpAoFzSxezbinQId6p
My0JdJ7KUQ6omDbXt23fxtQePLCQm47AFs3G/x2JSyTmdq9ZNbvUf6KSKeqe/11g
K13Ip3QcncbFk8sODDxSIY4Add6Jc0Fi56so1j07f+aLty/rlo9/Bo2vc73SoiKl
dkqhtN2nDUhfKvqTLGPz2MfjFO7LbTwRqGb/KQWEyC9Hqyfffk7vVXNgi7cqGAC3
FOtg4ehuORdZJBh3W0Gxw1QUjvJyu7WTGL6l733wxy2gDlRGxLzc+vnwRSjxNNJp
girEEKETk9VV4b0GnlZp1my7Rbp+1V4RDN6JIf3yfvWRd9JvXrw=
=PxZj
-----END PGP SIGNATURE-----


Reply to: