Package : bind9 Version : 9.8.4.dfsg.P1-6+nmu2+deb7u20 CVE ID : CVE-2018-5735 Debian Bug : 889285
BIND, a DNS server implementation, was found to be vulnerable to a denial of service flaw was found in the handling of DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. This issue is closely related to CVE-2017-3139. For Debian 7 "Wheezy", these problems have been fixed in version 9.8.4.dfsg.P1-6+nmu2+deb7u20. We recommend that you upgrade your bind9 packages. For the detailed security status of bind9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/bind9 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
signature.asc
Description: PGP signature