Your message dated Sun, 10 Dec 2017 20:31:16 +0100
with message-id <[email protected]>
and subject line Re: Bug#830810: bind9: CVE-2016-6170: Improper restriction of 
zone size limit
has caused the Debian Bug report #830810,
regarding bind9: CVE-2016-6170: Improper restriction of zone size limit
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
830810: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830810
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: bind9
Version: 1:9.9.5.dfsg-9
Severity: important
Tags: security upstream

Hi,

the following vulnerability was published for bind9.

CVE-2016-6170[0]:
| ISC BIND through 9.10.4-P1 allows primary DNS servers to cause a
| denial of service (secondary DNS server crash) via a large AXFR
| response, and possibly allows IXFR servers to cause a denial of
| service (IXFR client crash) via a large IXFR response and allows
| remote authenticated users to cause a denial of service (primary DNS
| server crash) via a large UPDATE message.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-6170
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1353563

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Version: 1:9.10.6+dfsg-1

On Mon, Jul 11, 2016 at 09:01:31PM +0200, Salvatore Bonaccorso wrote:

Hi,

> the following vulnerability was published for bind9.
> 
> CVE-2016-6170[0]:
> | ISC BIND through 9.10.4-P1 allows primary DNS servers to cause a
> | denial of service (secondary DNS server crash) via a large AXFR
> | response, and possibly allows IXFR servers to cause a denial of
> | service (IXFR client crash) via a large IXFR response and allows
> | remote authenticated users to cause a denial of service (primary DNS
> | server crash) via a large UPDATE message.
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2016-6170
> [1] https://bugzilla.redhat.com/show_bug.cgi?id=1353563
> 
> Please adjust the affected versions in the BTS as needed.

The upstream fix has landed in Debian in 1:9.10.6+dfsg-1 . It is an
additional configuration knob to limit the maximum size of the inbound
zone transfer.

This is probably not important enough to backport. Looks like the
security team thinks the same?
https://security-tracker.debian.org/tracker/CVE-2016-6170

Bernhard

--- End Message ---

Reply via email to