Debian alert DLA-1025-2 (bind9)
From: | Thorsten Alteholz <debian@alteholz.de> | |
To: | debian-lts-announce@lists.debian.org | |
Subject: | [SECURITY] [DLA 1025-2] bind9 regression update | |
Date: | Tue, 25 Jul 2017 19:35:38 +0200 (CEST) | |
Message-ID: | <alpine.DEB.2.02.1707251933530.10614@jupiter.server.alteholz.net> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : bind9 The security update announced as DLA-1025-1 in bind9 introduced a regression. The fix for CVE-2017-3142 broke verification of TSIG signed TCP message sequences where not all the messages contain TSIG records. This is conform to the spec and may be used in AXFR and IXFR response. For Debian 7 "Wheezy", these problems have been fixed in version 1:9.8.4.dfsg.P1-6+nmu2+deb7u18. We recommend that you upgrade your bind9 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQJ8BAEBCgBmBQJZd4FqXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5 NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHzbkQAMA+TzUk8cdNAhdZ8bRjmUFi KyY3/JnvHaWGXoUsLNTkV9Ic5x7Rwfr3pNeULs4+F6zvQW36zySb8wnTld2X8Y/z BfTHEHo5BL+y/t6qyBMxsMo1ZBMufxVSvlYRoxXI5TxVrDbfhfunjB6u8s6D3laF /tA4ermAxji/16VglU5p+Yacv466D+WvIUslaINR1Z9aJttx8xlj3n9n63IFKy07 jXhTCMk8nWm/t/zZBNZbuJo/+kQbFDka1xuF/QnARPwTfTe8qsO7zGc8nLGWBjSd II9QXOhbvDbmAVTE5fJsT0BIB5ZTwtHWVzChGjPHNfhH9vigethUyc3A7HKCdWUR wmT76MgXNk31jjPpVzHg47pd46X/wqPuntNehj33U7OhIguqHgNYJ3QmMcgDaUKC 1d8ATkWjsUS4BY4c/3hfAmhVpwUyGqVtlnhPOEyZ9i2gUi1SIhae8IS9TaSgdqxx Mir2mQjyqXcFcsNWpvTewAoJBZhxI4CE4GKIip6DP6stOoFq6idPk5n9QJ5CGZy8 NxDjL60cE8BGb6HGYg6o0VwE/LmJMnynV8UqyCyZ9FsNW3notqug/8m1tt1oRfyd ZyvL1drSMlGoj/fC2vVps9fx+KULcMA1/OJRx/4hE8rOf92OFU/k+YEL9qX+vSrn MGngGEUPM00WWwdktqhJ =/C4X -----END PGP SIGNATURE-----